CVE ID,Description,CVSS Score,Attack Vector,Affected OS CVE-2024-21732,FlyCms through abbaa5a allows XSS via the permission management feature.,6.1,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N,N/A CVE-2023-5877,"The affiliate-toolkit WordPress plugin before 3.4.3 lacks authorization and authentication for requests to it's affiliate-toolkit-starter/tools/atkp_imagereceiver.php endpoint, allowing unauthenticated visitors to make requests to arbitrary URL's, including RFC1918 private addresses, leading to a Server Side Request Forgery (SSRF) issue.",9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,N/A CVE-2023-6000,"The Popup Builder WordPress plugin before 4.2.3 does not prevent simple visitors from updating existing popups, and injecting raw JavaScript in them, which could lead to Stored XSS attacks.",6.1,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N,N/A CVE-2023-6037,"The WP TripAdvisor Review Slider WordPress plugin before 11.9 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)",4.8,CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N,N/A CVE-2023-6064,The PayHere Payment Gateway WordPress plugin before 2.2.12 automatically creates publicly-accessible log files containing sensitive information when transactions occur.,7.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,N/A CVE-2023-6113,"The WP STAGING WordPress Backup Plugin before 3.1.3 and WP STAGING Pro WordPress Backup Plugin before 5.1.3 do not prevent visitors from leaking key information about ongoing backups processes, allowing unauthenticated attackers to download said backups later.",7.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,N/A CVE-2023-6271,"The Backup Migration WordPress plugin before 1.3.6 stores in-progress backups information in easy to find, publicly-accessible files, which may allow attackers monitoring those to leak sensitive information from the site's backups.",7.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,N/A CVE-2023-6421,"The Download Manager WordPress plugin before 3.2.83 does not protect file download's passwords, leaking it upon receiving an invalid one.",7.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,N/A CVE-2023-6485,"The Html5 Video Player WordPress plugin before 2.5.19 does not sanitise and escape some of its player settings, which combined with missing capability checks around the plugin could allow any authenticated users, such as low as subscribers to perform Stored Cross-Site Scripting attacks against high privilege users like admins",5.4,CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N,N/A CVE-2024-0181,A vulnerability was found in RRJ Nueva Ecija Engineer Online Portal 1.0. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /admin/admin_user.php of the component Admin Panel. The manipulation of the argument Firstname/Lastname/Username leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-249433 was assigned to this vulnerability.,2.4,CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N,N/A CVE-2023-50094,reNgine before 2.1.2 allows OS Command Injection if an adversary has a valid session ID. The attack places shell metacharacters in an api/tools/waf_detector/?url= string. The commands are executed as root via subprocess.check_output.,8.8,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,N/A CVE-2023-50096,"STMicroelectronics STSAFE-A1xx middleware before 3.3.7 allows MCU code execution if an adversary has the ability to read from and write to the I2C bus. This is caused by an StSafeA_ReceiveBytes buffer overflow in the X-CUBE-SAFEA1 Software Package for STSAFE-A sample applications (1.2.0), and thus can affect user-written code that was derived from a published sample application.",7.5,CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H,N/A CVE-2024-0182,A vulnerability was found in SourceCodester Engineers Online Portal 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file /admin/ of the component Admin Login. The manipulation of the argument username/password leads to sql injection. The attack may be launched remotely. The identifier of this vulnerability is VDB-249440.,7.3,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L,N/A CVE-2024-0183,A vulnerability was found in RRJ Nueva Ecija Engineer Online Portal 1.0. It has been classified as problematic. This affects an unknown part of the file /admin/students.php of the component NIA Office. The manipulation leads to basic cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-249441 was assigned to this vulnerability.,2.4,CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N,N/A CVE-2024-0184,A vulnerability was found in RRJ Nueva Ecija Engineer Online Portal 1.0. It has been declared as problematic. This vulnerability affects unknown code of the file /admin/edit_teacher.php of the component Add Enginer. The manipulation of the argument Firstname/Lastname leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-249442 is the identifier assigned to this vulnerability.,2.4,CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N,N/A CVE-2024-0185,A vulnerability was found in RRJ Nueva Ecija Engineer Online Portal 1.0. It has been rated as critical. This issue affects some unknown processing of the file dasboard_teacher.php of the component Avatar Handler. The manipulation leads to unrestricted upload. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-249443.,4.7,CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L,N/A CVE-2024-0186,A vulnerability classified as problematic has been found in HuiRan Host Reseller System up to 2.0.0. Affected is an unknown function of the file /user/index/findpass?do=4 of the component HTTP POST Request Handler. The manipulation leads to weak password recovery. It is possible to launch the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-249444.,3.7,CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N,N/A CVE-2023-32831,"In wlan driver, there is a possible PIN crack due to use of insufficiently random values. This could lead to local information disclosure with no execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00325055; Issue ID: MSV-868.",5.5,CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N,Mediatek Software Development Kit CVE-2023-32872,"In keyInstall, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08308607; Issue ID: ALPS08308607.",6.7,CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H,"Google Android 11.0, Google Android 13.0, Google Android 12.0" CVE-2023-32874,"In Modem IMS Stack, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01161803; Issue ID: MOLY01161803 (MSV-893).",9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,"Mediatek Nr16, Mediatek Lr13, Mediatek Nr17, Mediatek Nr15" CVE-2023-32875,"In keyInstall, there is a possible information disclosure due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08308607; Issue ID: ALPS08304217.",4.4,CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N,"Google Android 11.0, Google Android 13.0, Google Android 12.0" CVE-2023-32876,"In keyInstall, there is a possible information disclosure due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08308612; Issue ID: ALPS08308612.",4.4,CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N,"Google Android 11.0, Google Android 13.0, Google Android 12.0" CVE-2023-32877,"In battery, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08308070; Issue ID: ALPS08308070.",6.7,CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H,"Google Android 13.0, Google Android 12.0" CVE-2023-32878,"In battery, there is a possible information disclosure due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08308070; Issue ID: ALPS08307992.",4.4,CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N,"Google Android 13.0, Google Android 12.0" CVE-2023-32879,"In battery, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08308070; Issue ID: ALPS08308064.",6.7,CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H,"Google Android 13.0, Google Android 12.0" CVE-2023-32880,"In battery, there is a possible information disclosure due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08308070; Issue ID: ALPS08308076.",4.4,CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N,"Google Android 13.0, Google Android 12.0" CVE-2023-32881,"In battery, there is a possible information disclosure due to an integer overflow. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08308070; Issue ID: ALPS08308080.",4.4,CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N,"Google Android 13.0, Google Android 12.0" CVE-2023-32882,"In battery, there is a possible memory corruption due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08308070; Issue ID: ALPS08308616.",6.7,CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H,"Google Android 13.0, Google Android 12.0" CVE-2023-32883,"In Engineer Mode, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08282249; Issue ID: ALPS08282249.",6.7,CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H,"Google Android 13.0, Google Android 12.0" CVE-2023-32884,"In netdagent, there is a possible information disclosure due to an incorrect bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07944011; Issue ID: ALPS07944011.",6.7,CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H,"Google Android 13.0, Google Android 12.0" CVE-2023-32885,"In display drm, there is a possible memory corruption due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07780685; Issue ID: ALPS07780685.",6.7,CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H,"Google Android 13.0, Google Android 12.0" CVE-2023-32886,"In Modem IMS SMS UA, there is a possible out of bounds write due to a missing bounds check. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY00730807; Issue ID: MOLY00730807.",7.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,"Mediatek Nr16, Mediatek Nr17, Mediatek Nr15" CVE-2023-32887,"In Modem IMS Stack, there is a possible system crash due to a missing bounds check. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01161837; Issue ID: MOLY01161837 (MSV-892).",7.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,"Mediatek Nr16, Mediatek Nr17, Mediatek Nr15" CVE-2023-32888,"In Modem IMS Call UA, there is a possible out of bounds write due to a missing bounds check. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01161830; Issue ID: MOLY01161830 (MSV-894).",7.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,"Mediatek Nr16, Mediatek Nr17, Mediatek Nr15" CVE-2023-32889,"In Modem IMS Call UA, there is a possible out of bounds write due to a missing bounds check. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01161825; Issue ID: MOLY01161825 (MSV-895).",7.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,"Google Android 11.0, Google Android 13.0, Google Android 12.0" CVE-2023-32890,"In modem EMM, there is a possible system crash due to improper input validation. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01183647; Issue ID: MOLY01183647 (MSV-963).",7.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,"Mediatek Nr16, Mediatek Lr13, Mediatek Nr17, Mediatek Nr15" CVE-2023-32891,"In bluetooth service, there is a possible out of bounds write due to improper input validation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07933038; Issue ID: MSV-559.",6.7,CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H,"Google Android 11.0, Mediatek Lr13, Mediatek Nr15, Mediatek Nr17, Mediatek Nr16, Google Android 13.0, Google Android 12.0" CVE-2023-26157,Versions of the package libredwg before 0.12.5.6384 are vulnerable to Denial of Service (DoS) due to an out-of-bounds read involving section->num_pages in decode_r2007.c.,5.5,CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H,N/A CVE-2023-26159,"Versions of the package follow-redirects before 1.15.4 are vulnerable to Improper Input Validation due to the improper handling of URLs by the url.parse() function. When new URL() throws an error, it can be manipulated to misinterpret the hostname. An attacker could exploit this weakness to redirect traffic to a malicious site, potentially leading to information disclosure, phishing attacks, or other security breaches.",7.3,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L,N/A CVE-2023-28583,Memory corruption when IPv6 prefix timer object`s lifetime expires which are created while Netmgr daemon gets an IPv6 address.,6.7,CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H,"Qualcomm Wcn3988 Firmware, Qualcomm Snapdragon 855 Mobile Platform Firmware, Qualcomm Wsa8835 Firmware, Qualcomm Qca6430 Firmware, Qualcomm Fastconnect 6200 Firmware, Qualcomm Wcn3980 Firmware, Qualcomm Wcn3680B Firmware, Qualcomm Snapdragon W5\+ Gen 1 Wearable Platform Firmware, Qualcomm Sa6150P Firmware, Qualcomm Snapdragon 855\+\/860 Mobile Platform Firmware, Qualcomm Sa6155P Firmware, Qualcomm Wcn3610 Firmware, Qualcomm Sa6145P Firmware, Qualcomm Sa8195P Firmware, Qualcomm Wsa8830 Firmware, Qualcomm Wsa8810 Firmware, Qualcomm Qca6574Au Firmware, Qualcomm Wcd9341 Firmware, Qualcomm Sa8155P Firmware, Qualcomm Snapdragon Wear 4100\+ Platform Firmware, Qualcomm Sa8150P Firmware, Qualcomm Wcn3660B Firmware, Qualcomm Sa8145P Firmware, Qualcomm Wsa8815 Firmware, Qualcomm Qca6420 Firmware, Qualcomm Sd855 Firmware, Qualcomm Aqt1000 Firmware, Qualcomm Sw5100P Firmware, Qualcomm Sw5100 Firmware, Qualcomm Qca6696 Firmware" CVE-2023-33014,Information disclosure in Core services while processing a Diag command.,7.6,CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H,"Qualcomm Qca8081 Firmware, Qualcomm Ssg2125P Firmware, Qualcomm Wcn3988 Firmware, Qualcomm Wsa8835 Firmware, Qualcomm Qcn9024 Firmware, Qualcomm Qcs8550 Firmware, Qualcomm Sxr1230P Firmware, Qualcomm Qca6797Aq Firmware, Qualcomm Qam8650P Firmware, Qualcomm Wcd9380 Firmware, Qualcomm Wsa8832 Firmware, Qualcomm Qcm4490 Firmware, Qualcomm Ssg2115P Firmware, Qualcomm Qca8337 Firmware, Qualcomm Sxr2230P Firmware, Qualcomm Qam8255P Firmware, Qualcomm Qca6698Aq Firmware, Qualcomm Ar8035 Firmware, Qualcomm Snapdragon X70 Modem-Rf System Firmware, Qualcomm Wcd9370 Firmware, Qualcomm Snapdragon Ar2 Gen 1 Platform Firmware, Qualcomm Wcn3950 Firmware, Qualcomm Qcs4490 Firmware, Qualcomm Qcn6024 Firmware, Qualcomm Wsa8830 Firmware, Qualcomm Sm4450 Firmware, Qualcomm Wsa8810 Firmware, Qualcomm Qca6595 Firmware, Qualcomm Fastconnect 6900 Firmware, Qualcomm Fastconnect 7800 Firmware, Qualcomm Snapdragon X65 5G Modem-Rf System Firmware, Qualcomm Qam8775P Firmware, Qualcomm Wsa8815 Firmware, Qualcomm Qca6595Au Firmware, Qualcomm Fastconnect 6700 Firmware, Qualcomm Wcd9385 Firmware, Qualcomm Sa8255P Firmware" CVE-2023-33025,"Memory corruption in Data Modem when a non-standard SDP body, during a VOLTE call.",9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,"Qualcomm Qca8081 Firmware, Qualcomm Wcn3988 Firmware, Qualcomm Snapdragon 680 4G Mobile Platform Firmware, Qualcomm Wsa8835 Firmware, Qualcomm Qcn9024 Firmware, Qualcomm Wcd9375 Firmware, Qualcomm Wcd9380 Firmware, Qualcomm Wsa8832 Firmware, Qualcomm Qcm4490 Firmware, Qualcomm Qca8337 Firmware, Qualcomm Snapdragon X70 Modem-Rf System Firmware, Qualcomm Ar8035 Firmware, Qualcomm Snapdragon 685 4G Mobile Platform Firmware, Qualcomm Wcd9370 Firmware, Qualcomm Wcn3950 Firmware, Qualcomm Qcs4490 Firmware, Qualcomm Qcn6024 Firmware, Qualcomm Wsa8830 Firmware, Qualcomm Sm4450 Firmware, Qualcomm Wsa8810 Firmware, Qualcomm Fastconnect 6900 Firmware, Qualcomm Snapdragon X65 5G Modem-Rf System Firmware, Qualcomm Wsa8815 Firmware, Qualcomm Fastconnect 6700 Firmware" CVE-2023-33030,Memory corruption in HLOS while running playready use-case.,9.3,CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H,"Qualcomm Msm8996Au Firmware, Qualcomm Sd821 Firmware, Qualcomm Qca6174A Firmware, Qualcomm Mdm9640 Firmware, Qualcomm Snapdragon 8Cx Gen 3 Compute Platform Firmware, Qualcomm Wcn3988 Firmware, Qualcomm Sd865 5G Firmware, Qualcomm Wcd9375 Firmware, Qualcomm Qcs6125 Firmware, Qualcomm Qrb5165N Firmware, Qualcomm Qcn9074 Firmware, Qualcomm Qcs8550 Firmware, Qualcomm Snapdragon 888 5G Mobile Platform Firmware, Qualcomm Wsa8830 Firmware, Qualcomm Qsm8250 Firmware, Qualcomm Snapdragon 1100 Wearable Platform Firmware, Qualcomm Qca6797Aq Firmware, Qualcomm Qts110 Firmware, Qualcomm Ipq6010 Firmware, Qualcomm Sa6150P Firmware, Qualcomm Snapdragon 630 Mobile Platform Firmware, Qualcomm Snapdragon 855\+\/860 Mobile Platform Firmware, Qualcomm Wsa8832 Firmware, Qualcomm Qam8295P Firmware, Qualcomm Qca6320 Firmware, Qualcomm Snapdragon 425 Mobile Platform Firmware, Qualcomm Wcn3999 Firmware, Qualcomm Sd626 Firmware, Qualcomm Snapdragon 636 Mobile Platform Firmware, Qualcomm Qcs8250 Firmware, Qualcomm Snapdragon X24 Lte Modem Firmware, Qualcomm Smart Audio 200 Platform Firmware, Qualcomm Wcd9370 Firmware, Qualcomm Sd670 Firmware, Qualcomm Wcn3610 Firmware, Qualcomm Qcn5052 Firmware, Qualcomm Qsw8573 Firmware, Qualcomm Qcs4490 Firmware, Qualcomm Qcm6490 Firmware, Qualcomm Qca6574A Firmware, Qualcomm Snapdragon 450 Mobile Platform Firmware, Qualcomm Sm7250P Firmware, Qualcomm Wcd9330 Firmware, Qualcomm Qcs610 Firmware, Qualcomm Sm4450 Firmware, Qualcomm Qca6574Au Firmware, Qualcomm Wcn3615 Firmware, Qualcomm Snapdragon Wear 4100\+ Platform Firmware, Qualcomm Snapdragon 865 5G Mobile Platform Firmware, Qualcomm Mdm9650 Firmware, Qualcomm Qca9367 Firmware, Qualcomm Sd 8 Gen1 5G Firmware, Qualcomm Snapdragon 820 Automotive Platform Firmware, Qualcomm Snapdragon Wear 1300 Platform Firmware, Qualcomm Snapdragon 765 5G Mobile Platform Firmware, Qualcomm Qca4024 Firmware, Qualcomm Mdm9250 Firmware, Qualcomm Snapdragon 430 Mobile Platform Firmware, Qualcomm Qcs2290 Firmware, Qualcomm Snapdragon 768G 5G Mobile Platform Firmware, Qualcomm Snapdragon X5 Lte Modem Firmware, Qualcomm Wcn3660B Firmware, Qualcomm Wcd9360 Firmware, Qualcomm Qcm6125 Firmware, Qualcomm Sd730 Firmware, Qualcomm Qam8775P Firmware, Qualcomm Snapdragon 4 Gen 1 Mobile Platform Firmware, Qualcomm Snapdragon 780G 5G Mobile Platform Firmware, Qualcomm Snapdragon 665 Mobile Platform Firmware, Qualcomm Qca6420 Firmware, Qualcomm Qca6574 Firmware, Qualcomm Sm4125 Firmware, Qualcomm Snapdragon 662 Mobile Platform Firmware, Qualcomm Snapdragon 7C Gen 2 Compute Platform Firmware, Qualcomm Qca9379 Firmware, Qualcomm Aqt1000 Firmware, Qualcomm Robotics Rb3 Platform Firmware, Qualcomm Sd820 Firmware, Qualcomm Wcd9385 Firmware, Qualcomm Snapdragon 460 Mobile Platform Firmware, Qualcomm Snapdragon Xr2\+ Gen 1 Platform Firmware, Qualcomm Snapdragon 855 Mobile Platform Firmware, Qualcomm Snapdragon 680 4G Mobile Platform Firmware, Qualcomm Snapdragon 8Cx Gen 2 5G Compute Platform Firmware, Qualcomm 9207 Lte Modem Firmware, Qualcomm Qcn9024 Firmware, Qualcomm Qcn5122 Firmware, Qualcomm Snapdragon Wear 2100 Platform Firmware, Qualcomm Qsm8350 Firmware, Qualcomm Sxr1230P Firmware, Qualcomm C-V2X 9150 Firmware, Qualcomm Snapdragon 782G Mobile Platform Firmware, Qualcomm Wcd9380 Firmware, Qualcomm Snapdragon 865\+ 5G Mobile Platform Firmware, Qualcomm Sa8155 Firmware, Qualcomm Snapdragon W5\+ Gen 1 Wearable Platform Firmware, Qualcomm Smart Audio 400 Platform Firmware, Qualcomm Qcn6023 Firmware, Qualcomm Snapdragon 8Cx Compute Platform Firmware, Qualcomm Sa8295P Firmware, Qualcomm Qca6436 Firmware, Qualcomm Qca6698Aq Firmware, Qualcomm Ar8035 Firmware, Qualcomm Csrb31024 Firmware, Qualcomm Qcn9070 Firmware, Qualcomm Snapdragon 625 Mobile Platform Firmware, Qualcomm Snapdragon X70 Modem-Rf System Firmware, Qualcomm Robotics Rb5 Platform Firmware, Qualcomm Qca6564A Firmware, Qualcomm Qcn5152 Firmware, Qualcomm Sd835 Firmware, Qualcomm Snapdragon Auto 4G Modem Firmware, Qualcomm Qcn9012 Firmware, Qualcomm Wcn3950 Firmware, Qualcomm Sa6145P Firmware, Qualcomm Sa8195P Firmware, Qualcomm Csr8811 Firmware, Qualcomm Qca6564 Firmware, Qualcomm Snapdragon 720G Mobile Platform Firmware, Qualcomm Snapdragon 845 Mobile Platform Firmware, Qualcomm Qcs4290 Firmware, Qualcomm Smart Display 200 Platform Firmware, Qualcomm Qca4004 Firmware, Qualcomm Sd660 Firmware, Qualcomm Sxr2130 Firmware, Qualcomm Wcd9335 Firmware, Qualcomm Wsa8810 Firmware, Qualcomm Sd 675 Firmware, Qualcomm Ipq6018 Firmware, Qualcomm Ipq6005 Firmware, Qualcomm Qcm4290 Firmware, Qualcomm Qcn7606 Firmware, Qualcomm Qcs410 Firmware, Qualcomm Snapdragon 821 Mobile Platform Firmware, Qualcomm Snapdragon 850 Mobile Compute Platform Firmware, Qualcomm Apq8017 Firmware, Qualcomm Snapdragon 730 Mobile Platform Firmware, Qualcomm Snapdragon 675 Mobile Platform Firmware, Qualcomm Sa8145P Firmware, Qualcomm Sm6250P Firmware, Qualcomm Sd888 Firmware, Qualcomm Ar8031 Firmware, Qualcomm Wsa8815 Firmware, Qualcomm Sd855 Firmware, Qualcomm Snapdragon 820 Mobile Platform Firmware, Qualcomm 9205 Lte Modem Firmware, Qualcomm Sc8180X\+Sdx55 Firmware, Qualcomm Qcm2290 Firmware, Qualcomm Snapdragon 212 Mobile Platform Firmware, Qualcomm Snapdragon 439 Mobile Platform Firmware, Qualcomm Snapdragon Xr1 Platform Firmware, Qualcomm Fastconnect 6700 Firmware, Qualcomm Snapdragon 210 Processor Firmware, Qualcomm Snapdragon Xr2 5G Platform Firmware, Qualcomm Qca6696 Firmware, Qualcomm Csra6620 Firmware, Qualcomm Qca6391 Firmware, Qualcomm Qca8081 Firmware, Qualcomm Snapdragon 695 5G Mobile Platform Firmware, Qualcomm Snapdragon 7C\+ Gen 3 Compute Firmware, Qualcomm Wsa8835 Firmware, Qualcomm Snapdragon 835 Mobile Pc Platform Firmware, Qualcomm Snapdragon 626 Mobile Platform Firmware, Qualcomm Qualcomm 215 Mobile Platform Firmware, Qualcomm Qca6310 Firmware, Qualcomm Snapdragon 8\+ Gen 1 Mobile Platform Firmware, Qualcomm Wcn3980 Firmware, Qualcomm Qam8650P Firmware, Qualcomm Qca6234 Firmware, Qualcomm Qcm4490 Firmware, Qualcomm Qcn5021 Firmware, Qualcomm Qca9984 Firmware, Qualcomm Ssg2115P Firmware, Qualcomm Msm8909W Firmware, Qualcomm Flight Rb5 5G Platform Firmware, Qualcomm Sd 8Cx Firmware, Qualcomm Qca8072 Firmware, Qualcomm Sd 455 Firmware, Qualcomm Qca6421 Firmware, Qualcomm Snapdragon Ar2 Gen 1 Platform Firmware, Qualcomm Sa6155 Firmware, Qualcomm Qca8075 Firmware, Qualcomm Snapdragon 660 Mobile Platform Firmware, Qualcomm Qcn6024 Firmware, Qualcomm Wcn3990 Firmware, Qualcomm Snapdragon Wear 2500 Platform Firmware, Qualcomm Wcn3620 Firmware, Qualcomm Wcd9306 Firmware, Qualcomm Snapdragon 632 Mobile Platform Firmware, Qualcomm Qualcomm 205 Mobile Platform Firmware, Qualcomm Pm8937 Firmware, Qualcomm Qet4101 Firmware, Qualcomm Snapdragon 8 Gen 1 Mobile Platform Firmware, Qualcomm Wcn3910 Firmware, Qualcomm Snapdragon 8C Compute Platform Firmware, Qualcomm Sa9000P Firmware, Qualcomm Snapdragon Wear 3100 Platform Firmware, Qualcomm Ipq6028 Firmware, Qualcomm Msm8608 Firmware, Qualcomm Qca6335 Firmware, Qualcomm Ipq6000 Firmware, Qualcomm Snapdragon 427 Mobile Platform Firmware, Qualcomm Snapdragon 435 Mobile Platform Firmware, Qualcomm Snapdragon 480\+ 5G Mobile Platform Firmware, Qualcomm Snapdragon 480 5G Mobile Platform Firmware, Qualcomm Fsm10056 Firmware, Qualcomm Sm7315 Firmware, Qualcomm Snapdragon X12 Lte Modem Firmware, Qualcomm Sw5100P Firmware, Qualcomm Apq8037 Firmware, Qualcomm Sa8255P Firmware, Qualcomm Vision Intelligence 100 Platform Firmware, Qualcomm Sm6250 Firmware, Qualcomm Sdm429W Firmware, Qualcomm Ssg2125P Firmware, Qualcomm 315 5G Iot Modem Firmware, Qualcomm Wcd9371 Firmware, Qualcomm Snapdragon 1200 Wearable Platform Firmware, Qualcomm Sa4155P Firmware, Qualcomm Snapdragon X55 5G Modem-Rf System Firmware, Qualcomm Qca6430 Firmware, Qualcomm Home Hub 100 Platform Firmware, Qualcomm Fastconnect 6200 Firmware, Qualcomm Wcn3680B Firmware, Qualcomm Sd675 Firmware, Qualcomm Snapdragon 712 Mobile Platform Firmware, Qualcomm 9206 Lte Modem Firmware, Qualcomm Qca9377 Firmware, Qualcomm Sd460 Firmware, Qualcomm Snapdragon 429 Mobile Platform Firmware, Qualcomm Snapdragon 765G 5G Mobile Platform Firmware, Qualcomm Qcn9072 Firmware, Qualcomm Qcs6490 Firmware, Qualcomm Wcn3660 Firmware, Qualcomm Fastconnect 6800 Firmware, Qualcomm Sdx55 Firmware, Qualcomm Snapdragon 710 Mobile Platform Firmware, Qualcomm Qca8337 Firmware, Qualcomm Sxr2230P Firmware, Qualcomm Wcn6740 Firmware, Qualcomm Snapdragon 870 5G Mobile Platform Firmware, Qualcomm Qcn5022 Firmware, Qualcomm Qam8255P Firmware, Qualcomm Qca6431 Firmware, Qualcomm Apq8064Au Firmware, Qualcomm Snapdragon 685 4G Mobile Platform Firmware, Qualcomm Snapdragon 778G 5G Mobile Platform Firmware, Qualcomm Qcm4325 Firmware, Qualcomm Sa6155P Firmware, Qualcomm Snapdragon 690 5G Mobile Platform Firmware, Qualcomm Snapdragon 750G 5G Mobile Platform Firmware, Qualcomm Mdm9628 Firmware, Qualcomm Sm7325P Firmware, Qualcomm Csra6640 Firmware, Qualcomm Wcn3680 Firmware, Qualcomm Snapdragon 730G Mobile Platform Firmware, Qualcomm Msm8209 Firmware, Qualcomm Sg4150P Firmware, Qualcomm Qcn9022 Firmware, Qualcomm Snapdragon X50 5G Modem-Rf System Firmware, Qualcomm Msm8108 Firmware, Qualcomm Qrb5165M Firmware, Qualcomm Snapdragon 888\+ 5G Mobile Platform Firmware, Qualcomm Vision Intelligence 300 Platform Firmware, Qualcomm Wcd9341 Firmware, Qualcomm Sa8155P Firmware, Qualcomm Sd662 Firmware, Qualcomm Qca6595 Firmware, Qualcomm Sa4150P Firmware, Qualcomm Sa8150P Firmware, Qualcomm Snapdragon 208 Processor Firmware, Qualcomm Fastconnect 6900 Firmware, Qualcomm Mdm8207 Firmware, Qualcomm Qca6426 Firmware, Qualcomm Qca6564Au Firmware, Qualcomm Sdx57M Firmware, Qualcomm Fastconnect 7800 Firmware, Qualcomm Qcn5121 Firmware, Qualcomm Qcs8155 Firmware, Qualcomm Snapdragon 670 Mobile Platform Firmware, Qualcomm Snapdragon 7C Compute Platform Firmware, Qualcomm Snapdragon X65 5G Modem-Rf System Firmware, Qualcomm Vision Intelligence 400 Platform Firmware, Qualcomm Vision Intelligence 200 Platform Firmware, Qualcomm Sa8540P Firmware, Qualcomm Wcd9340 Firmware, Qualcomm Snapdragon 778G\+ 5G Mobile Platform Firmware, Qualcomm Qca6584Au Firmware, Qualcomm Wcd9326 Firmware, Qualcomm Snapdragon Auto 5G Modem-Rf Firmware, Qualcomm Qca6595Au Firmware, Qualcomm Qcn9011 Firmware, Qualcomm Snapdragon 678 Mobile Platform Firmware, Qualcomm Sxr1120 Firmware, Qualcomm Snapdragon 732G Mobile Platform Firmware, Qualcomm Qcn9000 Firmware, Qualcomm Sw5100 Firmware, Qualcomm Qca6584 Firmware" CVE-2023-33032,Memory corruption in TZ Secure OS while requesting a memory allocation from TA region.,9.3,CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H,"Qualcomm Qca6174A Firmware, Qualcomm Wcn3988 Firmware, Qualcomm Wcd9375 Firmware, Qualcomm Qcs6125 Firmware, Qualcomm Qcn9074 Firmware, Qualcomm Qts110 Firmware, Qualcomm Ipq6010 Firmware, Qualcomm Sa6150P Firmware, Qualcomm Snapdragon 855\+\/860 Mobile Platform Firmware, Qualcomm Wcn3999 Firmware, Qualcomm Qcn9274 Firmware, Qualcomm Snapdragon X24 Lte Modem Firmware, Qualcomm Ipq9008 Firmware, Qualcomm Wcd9370 Firmware, Qualcomm Qcn5052 Firmware, Qualcomm Qca6574A Firmware, Qualcomm Qcs610 Firmware, Qualcomm Qca6574Au Firmware, Qualcomm Snapdragon Wear 1300 Platform Firmware, Qualcomm Qca4024 Firmware, Qualcomm Qcm6125 Firmware, Qualcomm Sd730 Firmware, Qualcomm Ipq9574 Firmware, Qualcomm Qca8386 Firmware, Qualcomm Snapdragon 665 Mobile Platform Firmware, Qualcomm Qca6420 Firmware, Qualcomm Qca6574 Firmware, Qualcomm Snapdragon 7C Gen 2 Compute Platform Firmware, Qualcomm Aqt1000 Firmware, Qualcomm Qca8084 Firmware, Qualcomm Snapdragon 855 Mobile Platform Firmware, Qualcomm Snapdragon 8Cx Gen 2 5G Compute Platform Firmware, Qualcomm Qcn9024 Firmware, Qualcomm Qcn5122 Firmware, Qualcomm C-V2X 9150 Firmware, Qualcomm Wcd9380 Firmware, Qualcomm Sa8155 Firmware, Qualcomm Smart Audio 400 Platform Firmware, Qualcomm Qcn6023 Firmware, Qualcomm Snapdragon 8Cx Compute Platform Firmware, Qualcomm Csrb31024 Firmware, Qualcomm Qca6564A Firmware, Qualcomm Qcn5152 Firmware, Qualcomm Snapdragon Auto 4G Modem Firmware, Qualcomm Wcn3950 Firmware, Qualcomm Sa6145P Firmware, Qualcomm Sa8195P Firmware, Qualcomm Csr8811 Firmware, Qualcomm Qca6564 Firmware, Qualcomm Snapdragon 720G Mobile Platform Firmware, Qualcomm Wcd9335 Firmware, Qualcomm Wsa8810 Firmware, Qualcomm Qca4004 Firmware, Qualcomm Sd 675 Firmware, Qualcomm Ipq6018 Firmware, Qualcomm Ipq6005 Firmware, Qualcomm Qcs410 Firmware, Qualcomm Snapdragon 730 Mobile Platform Firmware, Qualcomm Snapdragon 675 Mobile Platform Firmware, Qualcomm Sa8145P Firmware, Qualcomm Sm6250P Firmware, Qualcomm Wsa8815 Firmware, Qualcomm Ar8031 Firmware, Qualcomm Sd855 Firmware, Qualcomm 9205 Lte Modem Firmware, Qualcomm Sc8180X\+Sdx55 Firmware, Qualcomm Qca6696 Firmware, Qualcomm Csra6620 Firmware, Qualcomm Qca6391 Firmware, Qualcomm Qca8081 Firmware, Qualcomm Wcn3980 Firmware, Qualcomm Qcn5021 Firmware, Qualcomm Qca8082 Firmware, Qualcomm Qca8072 Firmware, Qualcomm Sa6155 Firmware, Qualcomm Qca8075 Firmware, Qualcomm Wcn3990 Firmware, Qualcomm Qcn6024 Firmware, Qualcomm Wcd9306 Firmware, Qualcomm Snapdragon 8C Compute Platform Firmware, Qualcomm Ipq6028 Firmware, Qualcomm Ipq6000 Firmware, Qualcomm Fsm10056 Firmware, Qualcomm Sm6250 Firmware, Qualcomm Wcd9371 Firmware, Qualcomm Sa4155P Firmware, Qualcomm Snapdragon X55 5G Modem-Rf System Firmware, Qualcomm Qca6430 Firmware, Qualcomm Fastconnect 6200 Firmware, Qualcomm Sd675 Firmware, Qualcomm Qca9377 Firmware, Qualcomm Qcn9072 Firmware, Qualcomm Fastconnect 6800 Firmware, Qualcomm Sdx55 Firmware, Qualcomm Qca8085 Firmware, Qualcomm Qcn5022 Firmware, Qualcomm Sa6155P Firmware, Qualcomm Csra6640 Firmware, Qualcomm Snapdragon 730G Mobile Platform Firmware, Qualcomm Qcn9000 Firmware, Qualcomm Snapdragon X50 5G Modem-Rf System Firmware, Qualcomm Qcn9022 Firmware, Qualcomm Wcd9341 Firmware, Qualcomm Sa8155P Firmware, Qualcomm Qca6595 Firmware, Qualcomm Sa4150P Firmware, Qualcomm Sa8150P Firmware, Qualcomm Qca6564Au Firmware, Qualcomm Qcn5121 Firmware, Qualcomm Qcs8155 Firmware, Qualcomm Snapdragon 7C Compute Platform Firmware, Qualcomm Wcd9340 Firmware, Qualcomm Snapdragon Auto 5G Modem-Rf Firmware, Qualcomm Qca6595Au Firmware, Qualcomm Snapdragon 678 Mobile Platform Firmware, Qualcomm Snapdragon 732G Mobile Platform Firmware, Qualcomm Qcn9070 Firmware" CVE-2023-33033,Memory corruption in Audio during playback with speaker protection.,8.4,CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,"Qualcomm Msm8996Au Firmware, Qualcomm Qca6174A Firmware, Qualcomm Mdm9640 Firmware, Qualcomm Wcn3988 Firmware, Qualcomm Sd865 5G Firmware, Qualcomm Wcd9375 Firmware, Qualcomm Qcs6125 Firmware, Qualcomm Qrb5165N Firmware, Qualcomm Qcn9074 Firmware, Qualcomm Qcs8550 Firmware, Qualcomm Snapdragon 888 5G Mobile Platform Firmware, Qualcomm Wsa8830 Firmware, Qualcomm Qsm8250 Firmware, Qualcomm Snapdragon 1100 Wearable Platform Firmware, Qualcomm Qts110 Firmware, Qualcomm Snapdragon 630 Mobile Platform Firmware, Qualcomm Sa6150P Firmware, Qualcomm Snapdragon 855\+\/860 Mobile Platform Firmware, Qualcomm Wsa8832 Firmware, Qualcomm Qam8295P Firmware, Qualcomm Qca6320 Firmware, Qualcomm Snapdragon 425 Mobile Platform Firmware, Qualcomm Wcn3999 Firmware, Qualcomm Sd626 Firmware, Qualcomm Snapdragon 636 Mobile Platform Firmware, Qualcomm Qcs8250 Firmware, Qualcomm Snapdragon X24 Lte Modem Firmware, Qualcomm Smart Audio 200 Platform Firmware, Qualcomm Wcd9370 Firmware, Qualcomm Sd670 Firmware, Qualcomm Wcn3610 Firmware, Qualcomm Mdm9230 Firmware, Qualcomm Qcs4490 Firmware, Qualcomm Qcm6490 Firmware, Qualcomm Qca6574A Firmware, Qualcomm Snapdragon 450 Mobile Platform Firmware, Qualcomm Sm7250P Firmware, Qualcomm Wcd9330 Firmware, Qualcomm Qcs610 Firmware, Qualcomm Sm4450 Firmware, Qualcomm Qca6574Au Firmware, Qualcomm Wcn3615 Firmware, Qualcomm Snapdragon Wear 4100\+ Platform Firmware, Qualcomm Snapdragon 865 5G Mobile Platform Firmware, Qualcomm Mdm9650 Firmware, Qualcomm Mdm9235M Firmware, Qualcomm Qca9367 Firmware, Qualcomm Snapdragon 820 Automotive Platform Firmware, Qualcomm Snapdragon Wear 1300 Platform Firmware, Qualcomm Snapdragon 765 5G Mobile Platform Firmware, Qualcomm Mdm9250 Firmware, Qualcomm Snapdragon 430 Mobile Platform Firmware, Qualcomm Qcs2290 Firmware, Qualcomm Snapdragon 768G 5G Mobile Platform Firmware, Qualcomm Snapdragon X5 Lte Modem Firmware, Qualcomm Wcn3660B Firmware, Qualcomm Wcd9360 Firmware, Qualcomm Qcm6125 Firmware, Qualcomm Sd730 Firmware, Qualcomm Snapdragon 4 Gen 1 Mobile Platform Firmware, Qualcomm Mdm9225M Firmware, Qualcomm Snapdragon 780G 5G Mobile Platform Firmware, Qualcomm Snapdragon 665 Mobile Platform Firmware, Qualcomm Qca6420 Firmware, Qualcomm Qca6574 Firmware, Qualcomm Sm4125 Firmware, Qualcomm Snapdragon 662 Mobile Platform Firmware, Qualcomm Snapdragon 7C Gen 2 Compute Platform Firmware, Qualcomm Qca9379 Firmware, Qualcomm Aqt1000 Firmware, Qualcomm Robotics Rb3 Platform Firmware, Qualcomm Sd820 Firmware, Qualcomm Wcd9385 Firmware, Qualcomm Snapdragon 460 Mobile Platform Firmware, Qualcomm Snapdragon Xr2\+ Gen 1 Platform Firmware, Qualcomm Snapdragon 855 Mobile Platform Firmware, Qualcomm Snapdragon 680 4G Mobile Platform Firmware, Qualcomm Snapdragon 8Cx Gen 2 5G Compute Platform Firmware, Qualcomm 9207 Lte Modem Firmware, Qualcomm Qcn9024 Firmware, Qualcomm Snapdragon Wear 2100 Platform Firmware, Qualcomm C-V2X 9150 Firmware, Qualcomm Mdm9625M Firmware, Qualcomm Snapdragon 782G Mobile Platform Firmware, Qualcomm Wcd9380 Firmware, Qualcomm Snapdragon 865\+ 5G Mobile Platform Firmware, Qualcomm Sa8155 Firmware, Qualcomm Smart Audio 400 Platform Firmware, Qualcomm Snapdragon 8Cx Compute Platform Firmware, Qualcomm Sa8295P Firmware, Qualcomm Qca6436 Firmware, Qualcomm Qca6698Aq Firmware, Qualcomm Ar8035 Firmware, Qualcomm Csrb31024 Firmware, Qualcomm Snapdragon 625 Mobile Platform Firmware, Qualcomm Qca6174 Firmware, Qualcomm Mdm9630 Firmware, Qualcomm Snapdragon X70 Modem-Rf System Firmware, Qualcomm Robotics Rb5 Platform Firmware, Qualcomm Qca6564A Firmware, Qualcomm Snapdragon Auto 4G Modem Firmware, Qualcomm Sd835 Firmware, Qualcomm Qcn9012 Firmware, Qualcomm Wcn3950 Firmware, Qualcomm Sa6145P Firmware, Qualcomm Sa8195P Firmware, Qualcomm Snapdragon 845 Mobile Platform Firmware, Qualcomm Qca6564 Firmware, Qualcomm Snapdragon 720G Mobile Platform Firmware, Qualcomm Sxr2130 Firmware, Qualcomm Qcs4290 Firmware, Qualcomm Smart Display 200 Platform Firmware, Qualcomm Qca4004 Firmware, Qualcomm Sd660 Firmware, Qualcomm Wcd9335 Firmware, Qualcomm Wsa8810 Firmware, Qualcomm Sd 675 Firmware, Qualcomm Qcm4290 Firmware, Qualcomm Snapdragon 850 Mobile Compute Platform Firmware, Qualcomm Qcs410 Firmware, Qualcomm Apq8017 Firmware, Qualcomm Snapdragon 730 Mobile Platform Firmware, Qualcomm Snapdragon 675 Mobile Platform Firmware, Qualcomm Sa8145P Firmware, Qualcomm Sm6250P Firmware, Qualcomm Sd888 Firmware, Qualcomm Ar8031 Firmware, Qualcomm Wsa8815 Firmware, Qualcomm Sd855 Firmware, Qualcomm Snapdragon 820 Mobile Platform Firmware, Qualcomm 9205 Lte Modem Firmware, Qualcomm Sc8180X\+Sdx55 Firmware, Qualcomm Qcm2290 Firmware, Qualcomm Snapdragon 212 Mobile Platform Firmware, Qualcomm Snapdragon 439 Mobile Platform Firmware, Qualcomm Snapdragon Xr1 Platform Firmware, Qualcomm Fastconnect 6700 Firmware, Qualcomm Snapdragon 210 Processor Firmware, Qualcomm Snapdragon Xr2 5G Platform Firmware, Qualcomm Qca6696 Firmware, Qualcomm Csra6620 Firmware, Qualcomm Qca6391 Firmware, Qualcomm Qca8081 Firmware, Qualcomm Snapdragon 695 5G Mobile Platform Firmware, Qualcomm Snapdragon 7C\+ Gen 3 Compute Firmware, Qualcomm Wsa8835 Firmware, Qualcomm Snapdragon 835 Mobile Pc Platform Firmware, Qualcomm Snapdragon 626 Mobile Platform Firmware, Qualcomm Qualcomm 215 Mobile Platform Firmware, Qualcomm Qca6310 Firmware, Qualcomm Snapdragon 8\+ Gen 1 Mobile Platform Firmware, Qualcomm Mdm9625 Firmware, Qualcomm Wcn3980 Firmware, Qualcomm Qcm4490 Firmware, Qualcomm Qca9984 Firmware, Qualcomm Msm8909W Firmware, Qualcomm Flight Rb5 5G Platform Firmware, Qualcomm Sd 8Cx Firmware, Qualcomm Mdm9225 Firmware, Qualcomm Qca6421 Firmware, Qualcomm Sd 455 Firmware, Qualcomm Sa6155 Firmware, Qualcomm Apq8076 Firmware, Qualcomm Snapdragon 660 Mobile Platform Firmware, Qualcomm Qcn6024 Firmware, Qualcomm Wcn3990 Firmware, Qualcomm Snapdragon Wear 2500 Platform Firmware, Qualcomm Mdm9330 Firmware, Qualcomm Wcd9306 Firmware, Qualcomm Wcn3620 Firmware, Qualcomm Snapdragon 632 Mobile Platform Firmware, Qualcomm Qualcomm 205 Mobile Platform Firmware, Qualcomm Pm8937 Firmware, Qualcomm Snapdragon 8 Gen 1 Mobile Platform Firmware, Qualcomm Wcn3910 Firmware, Qualcomm Snapdragon 8C Compute Platform Firmware, Qualcomm Snapdragon Wear 3100 Platform Firmware, Qualcomm Msm8608 Firmware, Qualcomm Qca6335 Firmware, Qualcomm Snapdragon 427 Mobile Platform Firmware, Qualcomm Snapdragon 435 Mobile Platform Firmware, Qualcomm Snapdragon 480\+ 5G Mobile Platform Firmware, Qualcomm Snapdragon 480 5G Mobile Platform Firmware, Qualcomm Sm7315 Firmware, Qualcomm Snapdragon X12 Lte Modem Firmware, Qualcomm Apq8037 Firmware, Qualcomm Vision Intelligence 100 Platform Firmware, Qualcomm Mdm9635M Firmware, Qualcomm Sm6250 Firmware, Qualcomm Sdm429W Firmware, Qualcomm 315 5G Iot Modem Firmware, Qualcomm Wcd9371 Firmware, Qualcomm Snapdragon 1200 Wearable Platform Firmware, Qualcomm Sa4155P Firmware, Qualcomm Snapdragon X55 5G Modem-Rf System Firmware, Qualcomm Qca6430 Firmware, Qualcomm Home Hub 100 Platform Firmware, Qualcomm Fastconnect 6200 Firmware, Qualcomm Wcn3680B Firmware, Qualcomm Sd675 Firmware, Qualcomm Snapdragon 712 Mobile Platform Firmware, Qualcomm 9206 Lte Modem Firmware, Qualcomm Qca9377 Firmware, Qualcomm Sd460 Firmware, Qualcomm Snapdragon 429 Mobile Platform Firmware, Qualcomm Snapdragon 765G 5G Mobile Platform Firmware, Qualcomm Wcn3660 Firmware, Qualcomm Fastconnect 6800 Firmware, Qualcomm Sdx55 Firmware, Qualcomm Snapdragon 710 Mobile Platform Firmware, Qualcomm Qca8337 Firmware, Qualcomm Wcn6740 Firmware, Qualcomm Snapdragon 870 5G Mobile Platform Firmware, Qualcomm Qca6431 Firmware, Qualcomm Apq8064Au Firmware, Qualcomm Snapdragon 685 4G Mobile Platform Firmware, Qualcomm Snapdragon 778G 5G Mobile Platform Firmware, Qualcomm Sa6155P Firmware, Qualcomm Snapdragon 690 5G Mobile Platform Firmware, Qualcomm Snapdragon 750G 5G Mobile Platform Firmware, Qualcomm Mdm9628 Firmware, Qualcomm Sm7325P Firmware, Qualcomm Csra6640 Firmware, Qualcomm Wcn3680 Firmware, Qualcomm Snapdragon 730G Mobile Platform Firmware, Qualcomm Msm8209 Firmware, Qualcomm Sg4150P Firmware, Qualcomm Apq8084 Firmware, Qualcomm Snapdragon X50 5G Modem-Rf System Firmware, Qualcomm Msm8108 Firmware, Qualcomm Qrb5165M Firmware, Qualcomm Snapdragon 888\+ 5G Mobile Platform Firmware, Qualcomm Snapdragon X20 Lte Modem Firmware, Qualcomm Vision Intelligence 300 Platform Firmware, Qualcomm Sa8155P Firmware, Qualcomm Sd662 Firmware, Qualcomm Wcd9341 Firmware, Qualcomm Qca6595 Firmware, Qualcomm Sa4150P Firmware, Qualcomm Sa8150P Firmware, Qualcomm Snapdragon 208 Processor Firmware, Qualcomm Fastconnect 6900 Firmware, Qualcomm Mdm8207 Firmware, Qualcomm Qca6426 Firmware, Qualcomm Qca6564Au Firmware, Qualcomm Sdx57M Firmware, Qualcomm Fastconnect 7800 Firmware, Qualcomm Snapdragon 7C Compute Platform Firmware, Qualcomm Snapdragon 670 Mobile Platform Firmware, Qualcomm Snapdragon X65 5G Modem-Rf System Firmware, Qualcomm Vision Intelligence 400 Platform Firmware, Qualcomm Wcd9340 Firmware, Qualcomm Vision Intelligence 200 Platform Firmware, Qualcomm Snapdragon 778G\+ 5G Mobile Platform Firmware, Qualcomm Qca6584Au Firmware, Qualcomm Wcd9326 Firmware, Qualcomm Snapdragon Auto 5G Modem-Rf Firmware, Qualcomm Qca6595Au Firmware, Qualcomm Qcn9011 Firmware, Qualcomm Snapdragon 678 Mobile Platform Firmware, Qualcomm Sxr1120 Firmware, Qualcomm Snapdragon 732G Mobile Platform Firmware, Qualcomm Qcs6490 Firmware, Qualcomm Qca6584 Firmware" CVE-2023-33036,Permanent DOS in Hypervisor while untrusted VM without PSCI support makes a PSCI call.,7.1,CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H,"Qualcomm Qca6174A Firmware, Qualcomm Snapdragon 8Cx Gen 3 Compute Platform Firmware, Qualcomm Sd865 5G Firmware, Qualcomm Wcd9375 Firmware, Qualcomm Snapdragon 888 5G Mobile Platform Firmware, Qualcomm Qcs8550 Firmware, Qualcomm Qca6797Aq Firmware, Qualcomm Snapdragon 855\+\/860 Mobile Platform Firmware, Qualcomm Wsa8832 Firmware, Qualcomm Qam8295P Firmware, Qualcomm Snapdragon X24 Lte Modem Firmware, Qualcomm Wcd9370 Firmware, Qualcomm Sd670 Firmware, Qualcomm Qca6574A Firmware, Qualcomm Sm7250P Firmware, Qualcomm Qca6574Au Firmware, Qualcomm Snapdragon 865 5G Mobile Platform Firmware, Qualcomm Sd 8 Gen1 5G Firmware, Qualcomm Snapdragon 765 5G Mobile Platform Firmware, Qualcomm Snapdragon 768G 5G Mobile Platform Firmware, Qualcomm Qam8775P Firmware, Qualcomm Qca6420 Firmware, Qualcomm Qca6574 Firmware, Qualcomm Robotics Rb3 Platform Firmware, Qualcomm Aqt1000 Firmware, Qualcomm Wcd9385 Firmware, Qualcomm Snapdragon 855 Mobile Platform Firmware, Qualcomm Snapdragon 8Cx Gen 2 5G Compute Platform Firmware, Qualcomm Sxr1230P Firmware, Qualcomm Qsm8350 Firmware, Qualcomm Wcd9380 Firmware, Qualcomm Snapdragon 865\+ 5G Mobile Platform Firmware, Qualcomm Sa8155 Firmware, Qualcomm Snapdragon 8Cx Compute Platform Firmware, Qualcomm Sa8295P Firmware, Qualcomm Qca6436 Firmware, Qualcomm Qca6698Aq Firmware, Qualcomm Ar8035 Firmware, Qualcomm Qca6564A Firmware, Qualcomm Wcn3950 Firmware, Qualcomm Sa6145P Firmware, Qualcomm Snapdragon 845 Mobile Platform Firmware, Qualcomm Wsa8810 Firmware, Qualcomm Sxr2130 Firmware, Qualcomm Sd 675 Firmware, Qualcomm Snapdragon 850 Mobile Compute Platform Firmware, Qualcomm Snapdragon 675 Mobile Platform Firmware, Qualcomm Wsa8815 Firmware, Qualcomm Sd855 Firmware, Qualcomm Snapdragon Xr2 5G Platform Firmware, Qualcomm Qca6696 Firmware, Qualcomm Qca6391 Firmware, Qualcomm Qca8081 Firmware, Qualcomm Wsa8835 Firmware, Qualcomm Qca6310 Firmware, Qualcomm Wcn3980 Firmware, Qualcomm Qam8650P Firmware, Qualcomm Ssg2115P Firmware, Qualcomm Sd 8Cx Firmware, Qualcomm Qca6421 Firmware, Qualcomm Snapdragon Ar2 Gen 1 Platform Firmware, Qualcomm Sa6155 Firmware, Qualcomm Wcn3990 Firmware, Qualcomm Snapdragon 8 Gen 1 Mobile Platform Firmware, Qualcomm Snapdragon 8C Compute Platform Firmware, Qualcomm Sa9000P Firmware, Qualcomm Qca6335 Firmware, Qualcomm Sa8255P Firmware, Qualcomm Ssg2125P Firmware, Qualcomm Snapdragon X55 5G Modem-Rf System Firmware, Qualcomm Qca6430 Firmware, Qualcomm Fastconnect 6200 Firmware, Qualcomm Sd675 Firmware, Qualcomm Qca9377 Firmware, Qualcomm Snapdragon 765G 5G Mobile Platform Firmware, Qualcomm Fastconnect 6800 Firmware, Qualcomm Sdx55 Firmware, Qualcomm Qca8337 Firmware, Qualcomm Sxr2230P Firmware, Qualcomm Snapdragon 870 5G Mobile Platform Firmware, Qualcomm Qam8255P Firmware, Qualcomm Qca6431 Firmware, Qualcomm Sa6155P Firmware, Qualcomm Snapdragon X50 5G Modem-Rf System Firmware, Qualcomm Wsa8830 Firmware, Qualcomm Wcd9341 Firmware, Qualcomm Snapdragon 888\+ 5G Mobile Platform Firmware, Qualcomm Vision Intelligence 300 Platform Firmware, Qualcomm Sa8155P Firmware, Qualcomm Qca6595 Firmware, Qualcomm Sa8150P Firmware, Qualcomm Fastconnect 6900 Firmware, Qualcomm Qca6426 Firmware, Qualcomm Qca6564Au Firmware, Qualcomm Sdx57M Firmware, Qualcomm Fastconnect 7800 Firmware, Qualcomm Snapdragon X65 5G Modem-Rf System Firmware, Qualcomm Snapdragon 670 Mobile Platform Firmware, Qualcomm Vision Intelligence 400 Platform Firmware, Qualcomm Wcd9340 Firmware, Qualcomm Sa8540P Firmware, Qualcomm Wcd9326 Firmware, Qualcomm Qca6595Au Firmware, Qualcomm Snapdragon 678 Mobile Platform Firmware" CVE-2023-33037,Cryptographic issue in Automotive while unwrapping the key secs2d and verifying with RPMB data.,7.1,CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N,"Qualcomm Snapdragon 8Cx Gen 3 Compute Platform Firmware, Qualcomm Wcn3988 Firmware, Qualcomm Sd865 5G Firmware, Qualcomm Wcd9375 Firmware, Qualcomm Snapdragon 888 5G Mobile Platform Firmware, Qualcomm Qcs8550 Firmware, Qualcomm Qca6797Aq Firmware, Qualcomm Sa6150P Firmware, Qualcomm Wsa8832 Firmware, Qualcomm Qam8295P Firmware, Qualcomm Wcd9370 Firmware, Qualcomm Qcs4490 Firmware, Qualcomm Qca6574A Firmware, Qualcomm Sm7250P Firmware, Qualcomm Sm4450 Firmware, Qualcomm Qca6574Au Firmware, Qualcomm Snapdragon 865 5G Mobile Platform Firmware, Qualcomm Sd 8 Gen1 5G Firmware, Qualcomm Snapdragon 765 5G Mobile Platform Firmware, Qualcomm Snapdragon 768G 5G Mobile Platform Firmware, Qualcomm Qam8775P Firmware, Qualcomm Qca6574 Firmware, Qualcomm Wcd9385 Firmware, Qualcomm Snapdragon 680 4G Mobile Platform Firmware, Qualcomm Qcn9024 Firmware, Qualcomm Sxr1230P Firmware, Qualcomm Qsm8350 Firmware, Qualcomm Wcd9380 Firmware, Qualcomm Snapdragon 865\+ 5G Mobile Platform Firmware, Qualcomm Sa8295P Firmware, Qualcomm Qca6436 Firmware, Qualcomm Qca6698Aq Firmware, Qualcomm Ar8035 Firmware, Qualcomm Wcn3950 Firmware, Qualcomm Sa6145P Firmware, Qualcomm Sa8195P Firmware, Qualcomm Wsa8810 Firmware, Qualcomm Sxr2130 Firmware, Qualcomm Sa8145P Firmware, Qualcomm Wsa8815 Firmware, Qualcomm Fastconnect 6700 Firmware, Qualcomm Snapdragon Xr2 5G Platform Firmware, Qualcomm Qca6696 Firmware, Qualcomm Qca6391 Firmware, Qualcomm Qca8081 Firmware, Qualcomm Wsa8835 Firmware, Qualcomm Snapdragon 8\+ Gen 1 Mobile Platform Firmware, Qualcomm Qam8650P Firmware, Qualcomm Qcm4490 Firmware, Qualcomm Ssg2115P Firmware, Qualcomm Qca6421 Firmware, Qualcomm Snapdragon Ar2 Gen 1 Platform Firmware, Qualcomm Qcn6024 Firmware, Qualcomm Snapdragon 8 Gen 1 Mobile Platform Firmware, Qualcomm Sa9000P Firmware, Qualcomm Sa8255P Firmware, Qualcomm Ssg2125P Firmware, Qualcomm Sa4155P Firmware, Qualcomm Snapdragon X55 5G Modem-Rf System Firmware, Qualcomm Fastconnect 6200 Firmware, Qualcomm Snapdragon 765G 5G Mobile Platform Firmware, Qualcomm Fastconnect 6800 Firmware, Qualcomm Qca8337 Firmware, Qualcomm Sxr2230P Firmware, Qualcomm Snapdragon 870 5G Mobile Platform Firmware, Qualcomm Qam8255P Firmware, Qualcomm Qca6431 Firmware, Qualcomm Snapdragon 685 4G Mobile Platform Firmware, Qualcomm Qcm4325 Firmware, Qualcomm Sa6155P Firmware, Qualcomm Sg4150P Firmware, Qualcomm Wsa8830 Firmware, Qualcomm Snapdragon 888\+ 5G Mobile Platform Firmware, Qualcomm Sa8155P Firmware, Qualcomm Qca6595 Firmware, Qualcomm Sa4150P Firmware, Qualcomm Sa8150P Firmware, Qualcomm Fastconnect 6900 Firmware, Qualcomm Qca6426 Firmware, Qualcomm Fastconnect 7800 Firmware, Qualcomm Snapdragon X65 5G Modem-Rf System Firmware, Qualcomm Sa8540P Firmware, Qualcomm Qca6595Au Firmware" CVE-2023-33038,Memory corruption while receiving a message in Bus Socket Transport Server.,6.7,CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H,"Qualcomm Qca6174A Firmware, Qualcomm Wcn3988 Firmware, Qualcomm Sd865 5G Firmware, Qualcomm Wcd9375 Firmware, Qualcomm Qcs6125 Firmware, Qualcomm Snapdragon 888 5G Mobile Platform Firmware, Qualcomm Qcs8550 Firmware, Qualcomm Sa6150P Firmware, Qualcomm Snapdragon 855\+\/860 Mobile Platform Firmware, Qualcomm Wsa8832 Firmware, Qualcomm Snapdragon X24 Lte Modem Firmware, Qualcomm Wcd9370 Firmware, Qualcomm Qcs4490 Firmware, Qualcomm Qcm6490 Firmware, Qualcomm Qca6574A Firmware, Qualcomm Sm7250P Firmware, Qualcomm Qcs610 Firmware, Qualcomm Sm4450 Firmware, Qualcomm Qca6574Au Firmware, Qualcomm Snapdragon 865 5G Mobile Platform Firmware, Qualcomm Snapdragon 765 5G Mobile Platform Firmware, Qualcomm Qcs2290 Firmware, Qualcomm Snapdragon 768G 5G Mobile Platform Firmware, Qualcomm Wcd9360 Firmware, Qualcomm Qcm6125 Firmware, Qualcomm Sd730 Firmware, Qualcomm Snapdragon 4 Gen 1 Mobile Platform Firmware, Qualcomm Snapdragon 780G 5G Mobile Platform Firmware, Qualcomm Snapdragon 665 Mobile Platform Firmware, Qualcomm Qca6420 Firmware, Qualcomm Snapdragon 662 Mobile Platform Firmware, Qualcomm Snapdragon 7C Gen 2 Compute Platform Firmware, Qualcomm Aqt1000 Firmware, Qualcomm Wcd9385 Firmware, Qualcomm Snapdragon 460 Mobile Platform Firmware, Qualcomm Snapdragon 855 Mobile Platform Firmware, Qualcomm Snapdragon 680 4G Mobile Platform Firmware, Qualcomm Snapdragon 8Cx Gen 2 5G Compute Platform Firmware, Qualcomm Qcn9024 Firmware, Qualcomm Snapdragon 782G Mobile Platform Firmware, Qualcomm Wcd9380 Firmware, Qualcomm Snapdragon 865\+ 5G Mobile Platform Firmware, Qualcomm Sa8155 Firmware, Qualcomm Snapdragon W5\+ Gen 1 Wearable Platform Firmware, Qualcomm Smart Audio 400 Platform Firmware, Qualcomm Snapdragon 8Cx Compute Platform Firmware, Qualcomm Qca6436 Firmware, Qualcomm Qca6698Aq Firmware, Qualcomm Ar8035 Firmware, Qualcomm Csrb31024 Firmware, Qualcomm Snapdragon X70 Modem-Rf System Firmware, Qualcomm Snapdragon Auto 4G Modem Firmware, Qualcomm Wcn3950 Firmware, Qualcomm Sa6145P Firmware, Qualcomm Sa8195P Firmware, Qualcomm Wcd9335 Firmware, Qualcomm Snapdragon 720G Mobile Platform Firmware, Qualcomm Sxr2130 Firmware, Qualcomm Wsa8810 Firmware, Qualcomm Qcs4290 Firmware, Qualcomm Sd 675 Firmware, Qualcomm Qcm4290 Firmware, Qualcomm Qcs410 Firmware, Qualcomm Snapdragon 730 Mobile Platform Firmware, Qualcomm Snapdragon 675 Mobile Platform Firmware, Qualcomm Sa8145P Firmware, Qualcomm Sm6250P Firmware, Qualcomm Sd888 Firmware, Qualcomm Wsa8815 Firmware, Qualcomm Sd855 Firmware, Qualcomm Sc8180X\+Sdx55 Firmware, Qualcomm Qcm2290 Firmware, Qualcomm Fastconnect 6700 Firmware, Qualcomm Snapdragon Xr2 5G Platform Firmware, Qualcomm Qca6696 Firmware, Qualcomm Csra6620 Firmware, Qualcomm Qca6391 Firmware, Qualcomm Qca8081 Firmware, Qualcomm Snapdragon 695 5G Mobile Platform Firmware, Qualcomm Snapdragon 7C\+ Gen 3 Compute Firmware, Qualcomm Wsa8835 Firmware, Qualcomm Wcn3980 Firmware, Qualcomm Snapdragon 8\+ Gen 1 Mobile Platform Firmware, Qualcomm Qcm4490 Firmware, Qualcomm Qca6421 Firmware, Qualcomm Sa6155 Firmware, Qualcomm Wcn3990 Firmware, Qualcomm Qcn6024 Firmware, Qualcomm Snapdragon 8 Gen 1 Mobile Platform Firmware, Qualcomm Wcn3910 Firmware, Qualcomm Snapdragon 8C Compute Platform Firmware, Qualcomm Snapdragon 480\+ 5G Mobile Platform Firmware, Qualcomm Snapdragon 480 5G Mobile Platform Firmware, Qualcomm Sm7315 Firmware, Qualcomm Sw5100P Firmware, Qualcomm Sm6250 Firmware, Qualcomm 315 5G Iot Modem Firmware, Qualcomm Wcd9371 Firmware, Qualcomm Snapdragon X55 5G Modem-Rf System Firmware, Qualcomm Qca6430 Firmware, Qualcomm Fastconnect 6200 Firmware, Qualcomm Sd675 Firmware, Qualcomm Qca9377 Firmware, Qualcomm Sd460 Firmware, Qualcomm Snapdragon 765G 5G Mobile Platform Firmware, Qualcomm Fastconnect 6800 Firmware, Qualcomm Sdx55 Firmware, Qualcomm Qca8337 Firmware, Qualcomm Wcn6740 Firmware, Qualcomm Snapdragon 870 5G Mobile Platform Firmware, Qualcomm Qca6431 Firmware, Qualcomm Snapdragon 685 4G Mobile Platform Firmware, Qualcomm Snapdragon 778G 5G Mobile Platform Firmware, Qualcomm Qcm4325 Firmware, Qualcomm Sa6155P Firmware, Qualcomm Snapdragon 690 5G Mobile Platform Firmware, Qualcomm Snapdragon 750G 5G Mobile Platform Firmware, Qualcomm Sm7325P Firmware, Qualcomm Csra6640 Firmware, Qualcomm Snapdragon 730G Mobile Platform Firmware, Qualcomm Sg4150P Firmware, Qualcomm Snapdragon X50 5G Modem-Rf System Firmware, Qualcomm Wsa8830 Firmware, Qualcomm Wcd9341 Firmware, Qualcomm Snapdragon 888\+ 5G Mobile Platform Firmware, Qualcomm Sa8155P Firmware, Qualcomm Sd662 Firmware, Qualcomm Sa8150P Firmware, Qualcomm Fastconnect 6900 Firmware, Qualcomm Qca6426 Firmware, Qualcomm Qca6564Au Firmware, Qualcomm Sdx57M Firmware, Qualcomm Fastconnect 7800 Firmware, Qualcomm Snapdragon 7C Compute Platform Firmware, Qualcomm Snapdragon X65 5G Modem-Rf System Firmware, Qualcomm Wcd9340 Firmware, Qualcomm Snapdragon 778G\+ 5G Mobile Platform Firmware, Qualcomm Wcd9326 Firmware, Qualcomm Snapdragon Auto 5G Modem-Rf Firmware, Qualcomm Qca6595Au Firmware, Qualcomm Snapdragon 678 Mobile Platform Firmware, Qualcomm Snapdragon 732G Mobile Platform Firmware, Qualcomm Qcs6490 Firmware, Qualcomm Sw5100 Firmware" CVE-2023-33040,Transient DOS in Data Modem during DTLS handshake.,7.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,"Qualcomm Qca6174A Firmware, Qualcomm Wcn3988 Firmware, Qualcomm Sd865 5G Firmware, Qualcomm Wcd9375 Firmware, Qualcomm Qcs6125 Firmware, Qualcomm Snapdragon 888 5G Mobile Platform Firmware, Qualcomm Qcs8550 Firmware, Qualcomm Sa6150P Firmware, Qualcomm Snapdragon 855\+\/860 Mobile Platform Firmware, Qualcomm Wsa8832 Firmware, Qualcomm Snapdragon X24 Lte Modem Firmware, Qualcomm Wcd9370 Firmware, Qualcomm Qcs4490 Firmware, Qualcomm Qcm6490 Firmware, Qualcomm Qca6574A Firmware, Qualcomm Sm7250P Firmware, Qualcomm Qcs610 Firmware, Qualcomm Sm4450 Firmware, Qualcomm Qca6574Au Firmware, Qualcomm Snapdragon 865 5G Mobile Platform Firmware, Qualcomm Snapdragon 765 5G Mobile Platform Firmware, Qualcomm Qcs2290 Firmware, Qualcomm Snapdragon 768G 5G Mobile Platform Firmware, Qualcomm Wcd9360 Firmware, Qualcomm Qcm6125 Firmware, Qualcomm Sd730 Firmware, Qualcomm Snapdragon 4 Gen 1 Mobile Platform Firmware, Qualcomm Snapdragon 780G 5G Mobile Platform Firmware, Qualcomm Snapdragon 665 Mobile Platform Firmware, Qualcomm Qca6420 Firmware, Qualcomm Snapdragon 662 Mobile Platform Firmware, Qualcomm Snapdragon 7C Gen 2 Compute Platform Firmware, Qualcomm Aqt1000 Firmware, Qualcomm Wcd9385 Firmware, Qualcomm Snapdragon 460 Mobile Platform Firmware, Qualcomm Snapdragon 855 Mobile Platform Firmware, Qualcomm Snapdragon 680 4G Mobile Platform Firmware, Qualcomm Snapdragon 8Cx Gen 2 5G Compute Platform Firmware, Qualcomm Qcn9024 Firmware, Qualcomm Snapdragon 782G Mobile Platform Firmware, Qualcomm Wcd9380 Firmware, Qualcomm Snapdragon 865\+ 5G Mobile Platform Firmware, Qualcomm Sa8155 Firmware, Qualcomm Snapdragon W5\+ Gen 1 Wearable Platform Firmware, Qualcomm Smart Audio 400 Platform Firmware, Qualcomm Snapdragon 8Cx Compute Platform Firmware, Qualcomm Qca6436 Firmware, Qualcomm Qca6698Aq Firmware, Qualcomm Ar8035 Firmware, Qualcomm Csrb31024 Firmware, Qualcomm Snapdragon X70 Modem-Rf System Firmware, Qualcomm Snapdragon Auto 4G Modem Firmware, Qualcomm Wcn3950 Firmware, Qualcomm Sa6145P Firmware, Qualcomm Sa8195P Firmware, Qualcomm Wcd9335 Firmware, Qualcomm Snapdragon 720G Mobile Platform Firmware, Qualcomm Sxr2130 Firmware, Qualcomm Wsa8810 Firmware, Qualcomm Qcs4290 Firmware, Qualcomm Sd 675 Firmware, Qualcomm Qcm4290 Firmware, Qualcomm Qcs410 Firmware, Qualcomm Snapdragon 730 Mobile Platform Firmware, Qualcomm Snapdragon 675 Mobile Platform Firmware, Qualcomm Sa8145P Firmware, Qualcomm Sm6250P Firmware, Qualcomm Sd888 Firmware, Qualcomm Wsa8815 Firmware, Qualcomm Sd855 Firmware, Qualcomm Sc8180X\+Sdx55 Firmware, Qualcomm Qcm2290 Firmware, Qualcomm Fastconnect 6700 Firmware, Qualcomm Snapdragon Xr2 5G Platform Firmware, Qualcomm Qca6696 Firmware, Qualcomm Csra6620 Firmware, Qualcomm Qca6391 Firmware, Qualcomm Qca8081 Firmware, Qualcomm Snapdragon 695 5G Mobile Platform Firmware, Qualcomm Snapdragon 7C\+ Gen 3 Compute Firmware, Qualcomm Wsa8835 Firmware, Qualcomm Wcn3980 Firmware, Qualcomm Snapdragon 8\+ Gen 1 Mobile Platform Firmware, Qualcomm Qcm4490 Firmware, Qualcomm Qca6421 Firmware, Qualcomm Sa6155 Firmware, Qualcomm Wcn3990 Firmware, Qualcomm Qcn6024 Firmware, Qualcomm Snapdragon 8 Gen 1 Mobile Platform Firmware, Qualcomm Wcn3910 Firmware, Qualcomm Snapdragon 8C Compute Platform Firmware, Qualcomm Snapdragon 480\+ 5G Mobile Platform Firmware, Qualcomm Snapdragon 480 5G Mobile Platform Firmware, Qualcomm Sm7315 Firmware, Qualcomm Sw5100P Firmware, Qualcomm Sm6250 Firmware, Qualcomm 315 5G Iot Modem Firmware, Qualcomm Wcd9371 Firmware, Qualcomm Snapdragon X55 5G Modem-Rf System Firmware, Qualcomm Qca6430 Firmware, Qualcomm Fastconnect 6200 Firmware, Qualcomm Sd675 Firmware, Qualcomm Qca9377 Firmware, Qualcomm Sd460 Firmware, Qualcomm Snapdragon 765G 5G Mobile Platform Firmware, Qualcomm Fastconnect 6800 Firmware, Qualcomm Sdx55 Firmware, Qualcomm Qca8337 Firmware, Qualcomm Wcn6740 Firmware, Qualcomm Snapdragon 870 5G Mobile Platform Firmware, Qualcomm Qca6431 Firmware, Qualcomm Snapdragon 685 4G Mobile Platform Firmware, Qualcomm Snapdragon 778G 5G Mobile Platform Firmware, Qualcomm Qcm4325 Firmware, Qualcomm Sa6155P Firmware, Qualcomm Snapdragon 690 5G Mobile Platform Firmware, Qualcomm Snapdragon 750G 5G Mobile Platform Firmware, Qualcomm Sm7325P Firmware, Qualcomm Csra6640 Firmware, Qualcomm Snapdragon 730G Mobile Platform Firmware, Qualcomm Sg4150P Firmware, Qualcomm Snapdragon X50 5G Modem-Rf System Firmware, Qualcomm Wsa8830 Firmware, Qualcomm Wcd9341 Firmware, Qualcomm Snapdragon 888\+ 5G Mobile Platform Firmware, Qualcomm Sa8155P Firmware, Qualcomm Sd662 Firmware, Qualcomm Sa8150P Firmware, Qualcomm Fastconnect 6900 Firmware, Qualcomm Qca6426 Firmware, Qualcomm Qca6564Au Firmware, Qualcomm Sdx57M Firmware, Qualcomm Fastconnect 7800 Firmware, Qualcomm Snapdragon 7C Compute Platform Firmware, Qualcomm Snapdragon X65 5G Modem-Rf System Firmware, Qualcomm Wcd9340 Firmware, Qualcomm Snapdragon 778G\+ 5G Mobile Platform Firmware, Qualcomm Wcd9326 Firmware, Qualcomm Snapdragon Auto 5G Modem-Rf Firmware, Qualcomm Qca6595Au Firmware, Qualcomm Snapdragon 678 Mobile Platform Firmware, Qualcomm Snapdragon 732G Mobile Platform Firmware, Qualcomm Qcs6490 Firmware, Qualcomm Sw5100 Firmware" CVE-2023-33062,Transient DOS in WLAN Firmware while parsing a BTM request.,7.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,"Qualcomm Ar9380 Firmware, Qualcomm Snapdragon 8Cx Gen 3 Compute Platform Firmware, Qualcomm Qcn7605 Firmware, Qualcomm Wcn3988 Firmware, Qualcomm Sd865 5G Firmware, Qualcomm Wcd9375 Firmware, Qualcomm Wcd9390 Firmware, Qualcomm Qcs6125 Firmware, Qualcomm Qrb5165N Firmware, Qualcomm Qcn9074 Firmware, Qualcomm Qcs8550 Firmware, Qualcomm Qualcomm Video Collaboration Vc3 Platform Firmware, Qualcomm Snapdragon 888 5G Mobile Platform Firmware, Qualcomm Qsm8250 Firmware, Qualcomm Snapdragon 4 Gen 2 Mobile Platform Firmware, Qualcomm Qca6797Aq Firmware, Qualcomm Ipq6010 Firmware, Qualcomm Sa6150P Firmware, Qualcomm Snapdragon 855\+\/860 Mobile Platform Firmware, Qualcomm Wsa8832 Firmware, Qualcomm Qam8295P Firmware, Qualcomm Qca9886 Firmware, Qualcomm Wcn3999 Firmware, Qualcomm Qcn9274 Firmware, Qualcomm Qcs8250 Firmware, Qualcomm Ipq9554 Firmware, Qualcomm Ipq9008 Firmware, Qualcomm Wcd9370 Firmware, Qualcomm Wsa8845H Firmware, Qualcomm Sd670 Firmware, Qualcomm Qcn5052 Firmware, Qualcomm Ipq8074A Firmware, Qualcomm Qcm6490 Firmware, Qualcomm Qca6574A Firmware, Qualcomm Qcs4490 Firmware, Qualcomm Sm7250P Firmware, Qualcomm Ipq8174 Firmware, Qualcomm Qcs610 Firmware, Qualcomm Qca6574Au Firmware, Qualcomm Snapdragon 865 5G Mobile Platform Firmware, Qualcomm Qca1064 Firmware, Qualcomm Sd 8 Gen1 5G Firmware, Qualcomm Snapdragon 765 5G Mobile Platform Firmware, Qualcomm Qca2065 Firmware, Qualcomm Qca4024 Firmware, Qualcomm Qcn9002 Firmware, Qualcomm Qcs2290 Firmware, Qualcomm Snapdragon 768G 5G Mobile Platform Firmware, Qualcomm Qca2064 Firmware, Qualcomm Wcd9360 Firmware, Qualcomm Qcm6125 Firmware, Qualcomm Sd730 Firmware, Qualcomm Qam8775P Firmware, Qualcomm Qca9888 Firmware, Qualcomm Ipq9574 Firmware, Qualcomm Ipq8078 Firmware, Qualcomm Qca8386 Firmware, Qualcomm Qcn5124 Firmware, Qualcomm Qca0000 Firmware, Qualcomm Qcn6122 Firmware, Qualcomm Qca6420 Firmware, Qualcomm Qca6574 Firmware, Qualcomm Sm4125 Firmware, Qualcomm Snapdragon 4 Gen 1 Mobile Platform Firmware, Qualcomm Snapdragon 662 Mobile Platform Firmware, Qualcomm Snapdragon 665 Mobile Platform Firmware, Qualcomm Snapdragon 7C Gen 2 Compute Platform Firmware, Qualcomm Robotics Rb3 Platform Firmware, Qualcomm Aqt1000 Firmware, Qualcomm Wcd9385 Firmware, Qualcomm Qca8084 Firmware, Qualcomm Snapdragon 460 Mobile Platform Firmware, Qualcomm Snapdragon Xr2\+ Gen 1 Platform Firmware, Qualcomm Ipq8070 Firmware, Qualcomm Ipq8072A Firmware, Qualcomm Snapdragon 855 Mobile Platform Firmware, Qualcomm Snapdragon 680 4G Mobile Platform Firmware, Qualcomm Snapdragon 8Cx Gen 2 5G Compute Platform Firmware, Qualcomm Qca9980 Firmware, Qualcomm Qcn9024 Firmware, Qualcomm Immersive Home 214 Platform Firmware, Qualcomm Qcn5122 Firmware, Qualcomm Sxr1230P Firmware, Qualcomm Qsm8350 Firmware, Qualcomm Snapdragon 782G Mobile Platform Firmware, Qualcomm Wcd9380 Firmware, Qualcomm Ipq8065 Firmware, Qualcomm Pmp8074 Firmware, Qualcomm Sa8155 Firmware, Qualcomm Sm8550P Firmware, Qualcomm Smart Audio 400 Platform Firmware, Qualcomm Snapdragon 865\+ 5G Mobile Platform Firmware, Qualcomm Snapdragon W5\+ Gen 1 Wearable Platform Firmware, Qualcomm Qcn6023 Firmware, Qualcomm Snapdragon 8\+ Gen 2 Mobile Platform Firmware, Qualcomm Snapdragon 8Cx Compute Platform Firmware, Qualcomm Sa8295P Firmware, Qualcomm Qca6436 Firmware, Qualcomm Qca6698Aq Firmware, Qualcomm Ar8035 Firmware, Qualcomm Csrb31024 Firmware, Qualcomm Qcn9070 Firmware, Qualcomm Robotics Rb5 Platform Firmware, Qualcomm Snapdragon Auto 4G Modem Firmware, Qualcomm Qcn5152 Firmware, Qualcomm Qcn9012 Firmware, Qualcomm Wcn3950 Firmware, Qualcomm Qualcomm Video Collaboration Vc1 Platform Firmware, Qualcomm Sa6145P Firmware, Qualcomm Sa8195P Firmware, Qualcomm Immersive Home 316 Platform Firmware, Qualcomm Csr8811 Firmware, Qualcomm Snapdragon 720G Mobile Platform Firmware, Qualcomm Snapdragon 845 Mobile Platform Firmware, Qualcomm Sxr2130 Firmware, Qualcomm Qcs4290 Firmware, Qualcomm Wcd9335 Firmware, Qualcomm Sd660 Firmware, Qualcomm Wsa8810 Firmware, Qualcomm Qca6678Aq Firmware, Qualcomm Sd 675 Firmware, Qualcomm Qcn6100 Firmware, Qualcomm Ipq6018 Firmware, Qualcomm Sdx65M Firmware, Qualcomm Qcm4290 Firmware, Qualcomm Snapdragon 850 Mobile Compute Platform Firmware, Qualcomm Qcs410 Firmware, Qualcomm Qca2062 Firmware, Qualcomm Snapdragon 730 Mobile Platform Firmware, Qualcomm Snapdragon 675 Mobile Platform Firmware, Qualcomm Sa8145P Firmware, Qualcomm Sm6250P Firmware, Qualcomm Sd888 Firmware, Qualcomm Ar8031 Firmware, Qualcomm Qcn5154 Firmware, Qualcomm Wcn6740 Firmware, Qualcomm Qca1062 Firmware, Qualcomm Sd855 Firmware, Qualcomm Wsa8815 Firmware, Qualcomm Ipq8070A Firmware, Qualcomm Sc8180X\+Sdx55 Firmware, Qualcomm Qcm2290 Firmware, Qualcomm Snapdragon Xr1 Platform Firmware, Qualcomm Fastconnect 6700 Firmware, Qualcomm Snapdragon Xr2 5G Platform Firmware, Qualcomm Qca6696 Firmware, Qualcomm Ipq8076 Firmware, Qualcomm Csra6620 Firmware, Qualcomm Qca6391 Firmware, Qualcomm Qca8081 Firmware, Qualcomm Snapdragon 695 5G Mobile Platform Firmware, Qualcomm Snapdragon 7C\+ Gen 3 Compute Firmware, Qualcomm Wsa8835 Firmware, Qualcomm Qca9985 Firmware, Qualcomm Qualcomm Video Collaboration Vc5 Platform Firmware, Qualcomm Qca6554A Firmware, Qualcomm Qca6310 Firmware, Qualcomm Snapdragon 8\+ Gen 1 Mobile Platform Firmware, Qualcomm Wcn3980 Firmware, Qualcomm Qam8650P Firmware, Qualcomm Qcn5164 Firmware, Qualcomm Immersive Home 216 Platform Firmware, Qualcomm Qcm4490 Firmware, Qualcomm Qca8082 Firmware, Qualcomm Qca9984 Firmware, Qualcomm Qcn5021 Firmware, Qualcomm Flight Rb5 5G Platform Firmware, Qualcomm Sd 8Cx Firmware, Qualcomm Ssg2115P Firmware, Qualcomm Ipq8068 Firmware, Qualcomm Qcc2076 Firmware, Qualcomm Qca8072 Firmware, Qualcomm Qca6421 Firmware, Qualcomm Ipq8173 Firmware, Qualcomm Snapdragon Ar2 Gen 1 Platform Firmware, Qualcomm Sa6155 Firmware, Qualcomm Snapdragon 8 Gen 2 Mobile Platform Firmware, Qualcomm Ipq5010 Firmware, Qualcomm Qca8075 Firmware, Qualcomm Snapdragon 660 Mobile Platform Firmware, Qualcomm Qcn6024 Firmware, Qualcomm Wcn3990 Firmware, Qualcomm Snapdragon 8 Gen 1 Mobile Platform Firmware, Qualcomm Qcc2073 Firmware, Qualcomm Wcn3910 Firmware, Qualcomm Snapdragon 8C Compute Platform Firmware, Qualcomm Ipq6028 Firmware, Qualcomm Qca6335 Firmware, Qualcomm Ipq6000 Firmware, Qualcomm Qcn9013 Firmware, Qualcomm Wsa8840 Firmware, Qualcomm Qca9986 Firmware, Qualcomm Ipq8078A Firmware, Qualcomm Snapdragon 480\+ 5G Mobile Platform Firmware, Qualcomm Qcn5024 Firmware, Qualcomm Snapdragon 480 5G Mobile Platform Firmware, Qualcomm Qcn9100 Firmware, Qualcomm Immersive Home 326 Platform Firmware, Qualcomm Sm7315 Firmware, Qualcomm Qcs7230 Firmware, Qualcomm Qca9992 Firmware, Qualcomm Sw5100P Firmware, Qualcomm Ipq9570 Firmware, Qualcomm Qcn9003 Firmware, Qualcomm Sa8255P Firmware, Qualcomm Sm6250 Firmware, Qualcomm Qca2066 Firmware, Qualcomm Ssg2125P Firmware, Qualcomm 315 5G Iot Modem Firmware, Qualcomm Qcn5054 Firmware, Qualcomm Wcd9371 Firmware, Qualcomm Qca9990 Firmware, Qualcomm Snapdragon X55 5G Modem-Rf System Firmware, Qualcomm Qca6430 Firmware, Qualcomm Qcn6102 Firmware, Qualcomm Fastconnect 6200 Firmware, Qualcomm Sd675 Firmware, Qualcomm Snapdragon 712 Mobile Platform Firmware, Qualcomm Wsa8845 Firmware, Qualcomm Sd460 Firmware, Qualcomm Snapdragon 765G 5G Mobile Platform Firmware, Qualcomm Qcn9072 Firmware, Qualcomm Qcs6490 Firmware, Qualcomm Fastconnect 6800 Firmware, Qualcomm Sdx55 Firmware, Qualcomm Qcn6112 Firmware, Qualcomm Qca8085 Firmware, Qualcomm Qca8337 Firmware, Qualcomm Snapdragon 710 Mobile Platform Firmware, Qualcomm Ipq8071A Firmware, Qualcomm Qcn5022 Firmware, Qualcomm Snapdragon 870 5G Mobile Platform Firmware, Qualcomm Qam8255P Firmware, Qualcomm Sxr2230P Firmware, Qualcomm Qca6431 Firmware, Qualcomm Immersive Home 3210 Platform Firmware, Qualcomm Qcn9001 Firmware, Qualcomm Snapdragon 685 4G Mobile Platform Firmware, Qualcomm Snapdragon 778G 5G Mobile Platform Firmware, Qualcomm Qcm4325 Firmware, Qualcomm Sa6155P Firmware, Qualcomm Snapdragon 690 5G Mobile Platform Firmware, Qualcomm Qca9889 Firmware, Qualcomm Snapdragon 750G 5G Mobile Platform Firmware, Qualcomm Wcd9395 Firmware, Qualcomm Sm7325P Firmware, Qualcomm Csra6640 Firmware, Qualcomm Snapdragon 730G Mobile Platform Firmware, Qualcomm Sg4150P Firmware, Qualcomm Snapdragon X50 5G Modem-Rf System Firmware, Qualcomm Qcn9022 Firmware, Qualcomm Wsa8830 Firmware, Qualcomm Wcd9341 Firmware, Qualcomm Qrb5165M Firmware, Qualcomm Snapdragon 888\+ 5G Mobile Platform Firmware, Qualcomm Vision Intelligence 300 Platform Firmware, Qualcomm Snapdragon 780G 5G Mobile Platform Firmware, Qualcomm Sa8155P Firmware, Qualcomm Sd662 Firmware, Qualcomm Qca6595 Firmware, Qualcomm Sa4150P Firmware, Qualcomm Sa8150P Firmware, Qualcomm Fastconnect 6900 Firmware, Qualcomm Immersive Home 318 Platform Firmware, Qualcomm Ipq8064 Firmware, Qualcomm Qca6426 Firmware, Qualcomm Ipq8076A Firmware, Qualcomm Ipq5028 Firmware, Qualcomm Fastconnect 7800 Firmware, Qualcomm Qca6564Au Firmware, Qualcomm Snapdragon 670 Mobile Platform Firmware, Qualcomm Snapdragon 7C Compute Platform Firmware, Qualcomm Qca9994 Firmware, Qualcomm Snapdragon X65 5G Modem-Rf System Firmware, Qualcomm Vision Intelligence 400 Platform Firmware, Qualcomm Wcd9340 Firmware, Qualcomm Snapdragon 778G\+ 5G Mobile Platform Firmware, Qualcomm Qca6584Au Firmware, Qualcomm Wcd9326 Firmware, Qualcomm Snapdragon Auto 5G Modem-Rf Firmware, Qualcomm Qca6595Au Firmware, Qualcomm Qcn9011 Firmware, Qualcomm Qcm8550 Firmware, Qualcomm Snapdragon 678 Mobile Platform Firmware, Qualcomm Sxr1120 Firmware, Qualcomm Snapdragon 732G Mobile Platform Firmware, Qualcomm Qcn9000 Firmware, Qualcomm Qcn6132 Firmware, Qualcomm Sw5100 Firmware, Qualcomm Qcn7606 Firmware" CVE-2023-33085,Memory corruption in wearables while processing data from AON.,7.8,CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,"Qualcomm Qca6174A Firmware, Qualcomm Wcn3988 Firmware, Qualcomm Wcd9375 Firmware, Qualcomm Wcd9390 Firmware, Qualcomm Qrb5165N Firmware, Qualcomm Qualcomm Video Collaboration Vc3 Platform Firmware, Qualcomm Qcs8550 Firmware, Qualcomm Snapdragon 888 5G Mobile Platform Firmware, Qualcomm Qca6797Aq Firmware, Qualcomm Sa6150P Firmware, Qualcomm Qam8295P Firmware, Qualcomm Wcd9370 Firmware, Qualcomm Wsa8845H Firmware, Qualcomm Qdx1011 Firmware, Qualcomm Qcm6490 Firmware, Qualcomm Qca6574A Firmware, Qualcomm Qcs610 Firmware, Qualcomm Qca6574Au Firmware, Qualcomm Qdu1110 Firmware, Qualcomm Wcn3660B Firmware, Qualcomm Wcd9360 Firmware, Qualcomm Qam8775P Firmware, Qualcomm Snapdragon 4 Gen 1 Mobile Platform Firmware, Qualcomm Snapdragon 780G 5G Mobile Platform Firmware, Qualcomm Qca6574 Firmware, Qualcomm Wcd9385 Firmware, Qualcomm Snapdragon 680 4G Mobile Platform Firmware, Qualcomm Qcn9024 Firmware, Qualcomm Snapdragon 782G Mobile Platform Firmware, Qualcomm Wcd9380 Firmware, Qualcomm Snapdragon W5\+ Gen 1 Wearable Platform Firmware, Qualcomm Sa8295P Firmware, Qualcomm Qca6698Aq Firmware, Qualcomm Ar8035 Firmware, Qualcomm Robotics Rb5 Platform Firmware, Qualcomm Qcn9012 Firmware, Qualcomm Wcn3950 Firmware, Qualcomm Qualcomm Video Collaboration Vc1 Platform Firmware, Qualcomm Sa6145P Firmware, Qualcomm Sa8195P Firmware, Qualcomm Wcd9335 Firmware, Qualcomm Wsa8810 Firmware, Qualcomm Qcs410 Firmware, Qualcomm Sa8145P Firmware, Qualcomm Wsa8815 Firmware, Qualcomm Sd888 Firmware, Qualcomm Qru1052 Firmware, Qualcomm Fastconnect 6700 Firmware, Qualcomm Qdu1210 Firmware, Qualcomm Qca6696 Firmware, Qualcomm Qca6391 Firmware, Qualcomm Qca8081 Firmware, Qualcomm Snapdragon 695 5G Mobile Platform Firmware, Qualcomm Snapdragon 7C\+ Gen 3 Compute Firmware, Qualcomm Wsa8835 Firmware, Qualcomm Wcn3980 Firmware, Qualcomm Qam8650P Firmware, Qualcomm Flight Rb5 5G Platform Firmware, Qualcomm Qcn6024 Firmware, Qualcomm Snapdragon 8 Gen 1 Mobile Platform Firmware, Qualcomm Sg8275P Firmware, Qualcomm Qdu1000 Firmware, Qualcomm Qru1062 Firmware, Qualcomm Wsa8840 Firmware, Qualcomm Snapdragon 480\+ 5G Mobile Platform Firmware, Qualcomm Snapdragon 480 5G Mobile Platform Firmware, Qualcomm Qru1032 Firmware, Qualcomm Sm7315 Firmware, Qualcomm Snapdragon X12 Lte Modem Firmware, Qualcomm Sw5100P Firmware, Qualcomm Sa8255P Firmware, Qualcomm Qdx1010 Firmware, Qualcomm Sa4155P Firmware, Qualcomm Fastconnect 6200 Firmware, Qualcomm Wcn3680B Firmware, Qualcomm Wsa8845 Firmware, Qualcomm Qca9377 Firmware, Qualcomm Sdx55 Firmware, Qualcomm Qca8337 Firmware, Qualcomm Qam8255P Firmware, Qualcomm Snapdragon 778G 5G Mobile Platform Firmware, Qualcomm Snapdragon 685 4G Mobile Platform Firmware, Qualcomm Qdu1010 Firmware, Qualcomm Qcm4325 Firmware, Qualcomm Sa6155P Firmware, Qualcomm Wcd9395 Firmware, Qualcomm Sm7325P Firmware, Qualcomm Wsa8830 Firmware, Qualcomm Wcd9341 Firmware, Qualcomm Qrb5165M Firmware, Qualcomm Snapdragon 888\+ 5G Mobile Platform Firmware, Qualcomm Sa8155P Firmware, Qualcomm Qca6595 Firmware, Qualcomm Sa4150P Firmware, Qualcomm Sa8150P Firmware, Qualcomm Fastconnect 6900 Firmware, Qualcomm Fastconnect 7800 Firmware, Qualcomm Snapdragon X65 5G Modem-Rf System Firmware, Qualcomm Snapdragon 778G\+ 5G Mobile Platform Firmware, Qualcomm Snapdragon Auto 5G Modem-Rf Firmware, Qualcomm Qca6595Au Firmware, Qualcomm Qcn9011 Firmware, Qualcomm Wcn6740 Firmware, Qualcomm Qcs6490 Firmware, Qualcomm Sw5100 Firmware" CVE-2023-33094,Memory corruption while running VK synchronization with KASAN enabled.,8.4,CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,"Qualcomm Wcn3988 Firmware, Qualcomm Sd865 5G Firmware, Qualcomm Wcd9375 Firmware, Qualcomm Wcd9390 Firmware, Qualcomm Qrb5165N Firmware, Qualcomm Qualcomm Video Collaboration Vc3 Platform Firmware, Qualcomm Qcs8550 Firmware, Qualcomm Snapdragon 888 5G Mobile Platform Firmware, Qualcomm Qca6797Aq Firmware, Qualcomm Sa6150P Firmware, Qualcomm Qam8295P Firmware, Qualcomm Qcs8250 Firmware, Qualcomm Wcd9370 Firmware, Qualcomm Wsa8845H Firmware, Qualcomm Qcm6490 Firmware, Qualcomm Qca6574A Firmware, Qualcomm Sm7250P Firmware, Qualcomm Qcs610 Firmware, Qualcomm Qca6574Au Firmware, Qualcomm Wcn3615 Firmware, Qualcomm Snapdragon 865 5G Mobile Platform Firmware, Qualcomm Snapdragon 765 5G Mobile Platform Firmware, Qualcomm Wcn3660B Firmware, Qualcomm Snapdragon 768G 5G Mobile Platform Firmware, Qualcomm Qam8775P Firmware, Qualcomm Snapdragon 4 Gen 1 Mobile Platform Firmware, Qualcomm Snapdragon 780G 5G Mobile Platform Firmware, Qualcomm Qca6574 Firmware, Qualcomm Wcd9385 Firmware, Qualcomm Snapdragon Xr2\+ Gen 1 Platform Firmware, Qualcomm Snapdragon 680 4G Mobile Platform Firmware, Qualcomm Qcn9024 Firmware, Qualcomm Snapdragon 782G Mobile Platform Firmware, Qualcomm Wcd9380 Firmware, Qualcomm Sm8550P Firmware, Qualcomm Snapdragon 865\+ 5G Mobile Platform Firmware, Qualcomm Snapdragon W5\+ Gen 1 Wearable Platform Firmware, Qualcomm Smart Audio 400 Platform Firmware, Qualcomm Snapdragon 8\+ Gen 2 Mobile Platform Firmware, Qualcomm Sa8295P Firmware, Qualcomm Qca6436 Firmware, Qualcomm Qca6698Aq Firmware, Qualcomm Ar8035 Firmware, Qualcomm Robotics Rb5 Platform Firmware, Qualcomm Qcn9012 Firmware, Qualcomm Wcn3950 Firmware, Qualcomm Qualcomm Video Collaboration Vc1 Platform Firmware, Qualcomm Sa6145P Firmware, Qualcomm Sa8195P Firmware, Qualcomm Wcd9335 Firmware, Qualcomm Wsa8810 Firmware, Qualcomm Sxr2130 Firmware, Qualcomm Sd660 Firmware, Qualcomm Qcs410 Firmware, Qualcomm Sa8145P Firmware, Qualcomm Wsa8815 Firmware, Qualcomm Sd888 Firmware, Qualcomm Fastconnect 6700 Firmware, Qualcomm Snapdragon Xr2 5G Platform Firmware, Qualcomm Qca6696 Firmware, Qualcomm Csra6620 Firmware, Qualcomm Qca6391 Firmware, Qualcomm Qca8081 Firmware, Qualcomm Snapdragon 695 5G Mobile Platform Firmware, Qualcomm Snapdragon 7C\+ Gen 3 Compute Firmware, Qualcomm Wsa8835 Firmware, Qualcomm Qualcomm Video Collaboration Vc5 Platform Firmware, Qualcomm Qualcomm 215 Mobile Platform Firmware, Qualcomm Wcn3980 Firmware, Qualcomm Qam8650P Firmware, Qualcomm Flight Rb5 5G Platform Firmware, Qualcomm Snapdragon 8 Gen 2 Mobile Platform Firmware, Qualcomm Snapdragon 660 Mobile Platform Firmware, Qualcomm Qcn6024 Firmware, Qualcomm Wcn3990 Firmware, Qualcomm Snapdragon 8 Gen 1 Mobile Platform Firmware, Qualcomm Sg8275P Firmware, Qualcomm Wsa8840 Firmware, Qualcomm Snapdragon 480\+ 5G Mobile Platform Firmware, Qualcomm Snapdragon 480 5G Mobile Platform Firmware, Qualcomm Sm7315 Firmware, Qualcomm Qcs7230 Firmware, Qualcomm Sw5100P Firmware, Qualcomm Sa8255P Firmware, Qualcomm Sa4155P Firmware, Qualcomm Snapdragon X55 5G Modem-Rf System Firmware, Qualcomm Fastconnect 6200 Firmware, Qualcomm Wcn3680B Firmware, Qualcomm Wsa8845 Firmware, Qualcomm Snapdragon 765G 5G Mobile Platform Firmware, Qualcomm Fastconnect 6800 Firmware, Qualcomm Qca8337 Firmware, Qualcomm Snapdragon 870 5G Mobile Platform Firmware, Qualcomm Qam8255P Firmware, Qualcomm Snapdragon 778G 5G Mobile Platform Firmware, Qualcomm Snapdragon 685 4G Mobile Platform Firmware, Qualcomm Qcm4325 Firmware, Qualcomm Sa6155P Firmware, Qualcomm Snapdragon 690 5G Mobile Platform Firmware, Qualcomm Snapdragon 750G 5G Mobile Platform Firmware, Qualcomm Wcd9395 Firmware, Qualcomm Sm7325P Firmware, Qualcomm Csra6640 Firmware, Qualcomm Sg4150P Firmware, Qualcomm Wsa8830 Firmware, Qualcomm Wcd9341 Firmware, Qualcomm Qrb5165M Firmware, Qualcomm Snapdragon 888\+ 5G Mobile Platform Firmware, Qualcomm Sa8155P Firmware, Qualcomm Qca6595 Firmware, Qualcomm Sa4150P Firmware, Qualcomm Sa8150P Firmware, Qualcomm Fastconnect 6900 Firmware, Qualcomm Qca6426 Firmware, Qualcomm Fastconnect 7800 Firmware, Qualcomm Snapdragon X65 5G Modem-Rf System Firmware, Qualcomm Snapdragon 778G\+ 5G Mobile Platform Firmware, Qualcomm Wcd9326 Firmware, Qualcomm Snapdragon Auto 5G Modem-Rf Firmware, Qualcomm Qca6595Au Firmware, Qualcomm Qcn9011 Firmware, Qualcomm Qcm8550 Firmware, Qualcomm Wcn6740 Firmware, Qualcomm Qcs6490 Firmware, Qualcomm Sw5100 Firmware" CVE-2023-33108,Memory corruption in Graphics Driver when destroying a context with KGSL_GPU_AUX_COMMAND_TIMELINE objects queued.,8.4,CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,"Qualcomm Qca6391 Firmware, Qualcomm Wsa8835 Firmware, Qualcomm Qualcomm Video Collaboration Vc5 Platform Firmware, Qualcomm Qca6797Aq Firmware, Qualcomm Qam8650P Firmware, Qualcomm Snapdragon W5\+ Gen 1 Wearable Platform Firmware, Qualcomm Qam8295P Firmware, Qualcomm Qcs8250 Firmware, Qualcomm Sa8295P Firmware, Qualcomm Qam8255P Firmware, Qualcomm Qca6698Aq Firmware, Qualcomm Sa6155P Firmware, Qualcomm Qca6574A Firmware, Qualcomm Sa8195P Firmware, Qualcomm Wsa8830 Firmware, Qualcomm Qca6574Au Firmware, Qualcomm Sa8155P Firmware, Qualcomm Qca6595 Firmware, Qualcomm Qam8775P Firmware, Qualcomm Qca6574 Firmware, Qualcomm Qca6595Au Firmware, Qualcomm Qcs7230 Firmware, Qualcomm Sw5100P Firmware, Qualcomm Sa8255P Firmware, Qualcomm Sw5100 Firmware, Qualcomm Qca6696 Firmware" CVE-2023-33109,Transient DOS while processing a WMI P2P listen start command (0xD00A) sent from host.,7.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,"Qualcomm Snapdragon 8Cx Gen 3 Compute Platform Firmware, Qualcomm Ipq6010 Firmware, Qualcomm Wcn3999 Firmware, Qualcomm Qcs8250 Firmware, Qualcomm Qcn5052 Firmware, Qualcomm Ipq8074A Firmware, Qualcomm Qcm6490 Firmware, Qualcomm Qca6574A Firmware, Qualcomm Snapdragon 765 5G Mobile Platform Firmware, Qualcomm Qca4024 Firmware, Qualcomm Qcs2290 Firmware, Qualcomm Wcd9360 Firmware, Qualcomm Qam8775P Firmware, Qualcomm Ipq9574 Firmware, Qualcomm Snapdragon 780G 5G Mobile Platform Firmware, Qualcomm Qca6420 Firmware, Qualcomm Qca6574 Firmware, Qualcomm Aqt1000 Firmware, Qualcomm Qca8084 Firmware, Qualcomm Qsm8350 Firmware, Qualcomm Wcd9380 Firmware, Qualcomm Snapdragon 865\+ 5G Mobile Platform Firmware, Qualcomm Qca6436 Firmware, Qualcomm Qcn5152 Firmware, Qualcomm Csr8811 Firmware, Qualcomm Qcn6100 Firmware, Qualcomm Qcs410 Firmware, Qualcomm Wsa8815 Firmware, Qualcomm Sd888 Firmware, Qualcomm Ar8031 Firmware, Qualcomm Sc8180X\+Sdx55 Firmware, Qualcomm Qcm2290 Firmware, Qualcomm Qca6696 Firmware, Qualcomm Ipq8076 Firmware, Qualcomm Snapdragon 695 5G Mobile Platform Firmware, Qualcomm Qca9985 Firmware, Qualcomm Qualcomm Video Collaboration Vc5 Platform Firmware, Qualcomm Wcn3980 Firmware, Qualcomm Ipq8069 Firmware, Qualcomm Qam8650P Firmware, Qualcomm Qcn5021 Firmware, Qualcomm Sd 8Cx Firmware, Qualcomm Qcc2076 Firmware, Qualcomm Snapdragon Ar2 Gen 1 Platform Firmware, Qualcomm Ipq5010 Firmware, Qualcomm Qca8075 Firmware, Qualcomm Wcn3990 Firmware, Qualcomm Qcn6024 Firmware, Qualcomm Qcn9013 Firmware, Qualcomm Qca9986 Firmware, Qualcomm Sw5100P Firmware, Qualcomm Qfw7124 Firmware, Qualcomm Ipq9570 Firmware, Qualcomm Qcn9003 Firmware, Qualcomm 315 5G Iot Modem Firmware, Qualcomm Qcn6102 Firmware, Qualcomm Sd460 Firmware, Qualcomm Snapdragon 765G 5G Mobile Platform Firmware, Qualcomm Sdx55 Firmware, Qualcomm Ipq8071A Firmware, Qualcomm Qcn5022 Firmware, Qualcomm Snapdragon 870 5G Mobile Platform Firmware, Qualcomm Qca6431 Firmware, Qualcomm Qcn9001 Firmware, Qualcomm Qcm4325 Firmware, Qualcomm Snapdragon 690 5G Mobile Platform Firmware, Qualcomm Snapdragon 750G 5G Mobile Platform Firmware, Qualcomm Sm7325P Firmware, Qualcomm Vision Intelligence 300 Platform Firmware, Qualcomm Sa8155P Firmware, Qualcomm Sd662 Firmware, Qualcomm Sa4150P Firmware, Qualcomm Immersive Home 318 Platform Firmware, Qualcomm Qca6564Au Firmware, Qualcomm Fastconnect 7800 Firmware, Qualcomm Snapdragon X65 5G Modem-Rf System Firmware, Qualcomm Qcn9011 Firmware, Qualcomm Snapdragon 678 Mobile Platform Firmware, Qualcomm Wcn6740 Firmware, Qualcomm Snapdragon 732G Mobile Platform Firmware, Qualcomm Qcn9070 Firmware, Qualcomm Ar9380 Firmware, Qualcomm Qcn7605 Firmware, Qualcomm Wcd9390 Firmware, Qualcomm Qrb5165N Firmware, Qualcomm Sa6150P Firmware, Qualcomm Qca6320 Firmware, Qualcomm Qca9886 Firmware, Qualcomm Ipq9554 Firmware, Qualcomm Ipq8174 Firmware, Qualcomm Qcs610 Firmware, Qualcomm Qca6574Au Firmware, Qualcomm Qca1064 Firmware, Qualcomm Sd 8 Gen1 5G Firmware, Qualcomm Qca2065 Firmware, Qualcomm Qcn9002 Firmware, Qualcomm Snapdragon 768G 5G Mobile Platform Firmware, Qualcomm Qca2064 Firmware, Qualcomm Qca8386 Firmware, Qualcomm Ipq8078 Firmware, Qualcomm Snapdragon 662 Mobile Platform Firmware, Qualcomm Wcd9385 Firmware, Qualcomm Snapdragon 855 Mobile Platform Firmware, Qualcomm Snapdragon 680 4G Mobile Platform Firmware, Qualcomm Qca9980 Firmware, Qualcomm Sxr1230P Firmware, Qualcomm Sa8155 Firmware, Qualcomm Snapdragon 8\+ Gen 2 Mobile Platform Firmware, Qualcomm Ar8035 Firmware, Qualcomm Csrb31024 Firmware, Qualcomm Qcn6274 Firmware, Qualcomm Ipq5332 Firmware, Qualcomm Snapdragon 845 Mobile Platform Firmware, Qualcomm Snapdragon 720G Mobile Platform Firmware, Qualcomm Sxr2130 Firmware, Qualcomm Qcs4290 Firmware, Qualcomm Snapdragon 850 Mobile Compute Platform Firmware, Qualcomm Ipq4029 Firmware, Qualcomm Snapdragon 675 Mobile Platform Firmware, Qualcomm Sm6250P Firmware, Qualcomm Sd855 Firmware, Qualcomm Snapdragon Xr2 5G Platform Firmware, Qualcomm Qca6391 Firmware, Qualcomm Wsa8835 Firmware, Qualcomm Qca6310 Firmware, Qualcomm Qcn5164 Firmware, Qualcomm Immersive Home 216 Platform Firmware, Qualcomm Qcm4490 Firmware, Qualcomm Ipq8173 Firmware, Qualcomm Snapdragon 8 Gen 2 Mobile Platform Firmware, Qualcomm Qca6428 Firmware, Qualcomm Snapdragon 8 Gen 1 Mobile Platform Firmware, Qualcomm Wcn3910 Firmware, Qualcomm Qca6335 Firmware, Qualcomm Wsa8840 Firmware, Qualcomm Qcn5024 Firmware, Qualcomm Immersive Home 326 Platform Firmware, Qualcomm Sa8255P Firmware, Qualcomm Qca2066 Firmware, Qualcomm Qca9990 Firmware, Qualcomm Snapdragon X55 5G Modem-Rf System Firmware, Qualcomm Fastconnect 6200 Firmware, Qualcomm Wsa8845 Firmware, Qualcomm Qcn9072 Firmware, Qualcomm Snapdragon 710 Mobile Platform Firmware, Qualcomm Qam8255P Firmware, Qualcomm Snapdragon 778G 5G Mobile Platform Firmware, Qualcomm Sg4150P Firmware, Qualcomm Wcd9341 Firmware, Qualcomm Qrb5165M Firmware, Qualcomm Fastconnect 6900 Firmware, Qualcomm Ipq8064 Firmware, Qualcomm Vision Intelligence 400 Platform Firmware, Qualcomm Qca9994 Firmware, Qualcomm Snapdragon 778G\+ 5G Mobile Platform Firmware, Qualcomm Snapdragon Auto 5G Modem-Rf Firmware, Qualcomm Qcn9000 Firmware, Qualcomm Qcn6132 Firmware, Qualcomm Qcn7606 Firmware, Qualcomm Wcd9375 Firmware, Qualcomm Qualcomm Video Collaboration Vc3 Platform Firmware, Qualcomm Qcn9074 Firmware, Qualcomm Qcs8550 Firmware, Qualcomm Snapdragon 888 5G Mobile Platform Firmware, Qualcomm Qsm8250 Firmware, Qualcomm Qca6797Aq Firmware, Qualcomm Snapdragon 855\+\/860 Mobile Platform Firmware, Qualcomm Wsa8832 Firmware, Qualcomm Qam8295P Firmware, Qualcomm Qcn9274 Firmware, Qualcomm Wcd9370 Firmware, Qualcomm Wsa8845H Firmware, Qualcomm Sd670 Firmware, Qualcomm Ipq4018 Firmware, Qualcomm Qcs4490 Firmware, Qualcomm Qca9898 Firmware, Qualcomm Sm7250P Firmware, Qualcomm Sd730 Firmware, Qualcomm Qcn6122 Firmware, Qualcomm Qcn5124 Firmware, Qualcomm Snapdragon 665 Mobile Platform Firmware, Qualcomm Sm4125 Firmware, Qualcomm Robotics Rb3 Platform Firmware, Qualcomm Snapdragon 460 Mobile Platform Firmware, Qualcomm Ipq8070 Firmware, Qualcomm Ipq8072A Firmware, Qualcomm Ipq8065 Firmware, Qualcomm Pmp8074 Firmware, Qualcomm Smart Audio 400 Platform Firmware, Qualcomm Qcn6023 Firmware, Qualcomm Snapdragon 8Cx Compute Platform Firmware, Qualcomm Sa8295P Firmware, Qualcomm Wcn3950 Firmware, Qualcomm Sa6145P Firmware, Qualcomm Immersive Home 316 Platform Firmware, Qualcomm Wcd9335 Firmware, Qualcomm Wsa8810 Firmware, Qualcomm Sd660 Firmware, Qualcomm Sd 675 Firmware, Qualcomm Sdx65M Firmware, Qualcomm Qfw7114 Firmware, Qualcomm Qca2062 Firmware, Qualcomm Sa8145P Firmware, Qualcomm Ipq8070A Firmware, Qualcomm Fastconnect 6700 Firmware, Qualcomm Snapdragon 7C\+ Gen 3 Compute Firmware, Qualcomm Snapdragon 835 Mobile Pc Platform Firmware, Qualcomm Snapdragon 8\+ Gen 1 Mobile Platform Firmware, Qualcomm Flight Rb5 5G Platform Firmware, Qualcomm Qca6421 Firmware, Qualcomm Sa6155 Firmware, Qualcomm Ipq6028 Firmware, Qualcomm Qcc710 Firmware, Qualcomm Qcn9100 Firmware, Qualcomm Sm7315 Firmware, Qualcomm Qca9992 Firmware, Qualcomm Sm6250 Firmware, Qualcomm Qcn6224 Firmware, Qualcomm Fastconnect 6800 Firmware, Qualcomm Qcn6112 Firmware, Qualcomm Qca8085 Firmware, Qualcomm Sxr2230P Firmware, Qualcomm Snapdragon 685 4G Mobile Platform Firmware, Qualcomm Wcd9395 Firmware, Qualcomm Qca9889 Firmware, Qualcomm Csra6640 Firmware, Qualcomm Qcn9022 Firmware, Qualcomm Snapdragon X75 5G Modem-Rf System Firmware, Qualcomm Qca6595 Firmware, Qualcomm Sa8150P Firmware, Qualcomm Qca6426 Firmware, Qualcomm Ipq8076A Firmware, Qualcomm Snapdragon 7C Compute Platform Firmware, Qualcomm Wcd9340 Firmware, Qualcomm Qca6584Au Firmware, Qualcomm Qca6595Au Firmware, Qualcomm Qcm8550 Firmware, Qualcomm Wcn3988 Firmware, Qualcomm Sd865 5G Firmware, Qualcomm Qcs6125 Firmware, Qualcomm Qca6438 Firmware, Qualcomm Snapdragon 4 Gen 2 Mobile Platform Firmware, Qualcomm Ipq9008 Firmware, Qualcomm Snapdragon 865 5G Mobile Platform Firmware, Qualcomm Qcm6125 Firmware, Qualcomm Qca9888 Firmware, Qualcomm Snapdragon 4 Gen 1 Mobile Platform Firmware, Qualcomm Qca0000 Firmware, Qualcomm Snapdragon 7C Gen 2 Compute Platform Firmware, Qualcomm Snapdragon Xr2\+ Gen 1 Platform Firmware, Qualcomm Snapdragon 8Cx Gen 2 5G Compute Platform Firmware, Qualcomm Qcn9024 Firmware, Qualcomm Immersive Home 214 Platform Firmware, Qualcomm Qcn5122 Firmware, Qualcomm Snapdragon 782G Mobile Platform Firmware, Qualcomm Sm8550P Firmware, Qualcomm Snapdragon W5\+ Gen 1 Wearable Platform Firmware, Qualcomm Qca6698Aq Firmware, Qualcomm Robotics Rb5 Platform Firmware, Qualcomm Snapdragon Auto 4G Modem Firmware, Qualcomm Sd835 Firmware, Qualcomm Qcn9012 Firmware, Qualcomm Qualcomm Video Collaboration Vc1 Platform Firmware, Qualcomm Sa8195P Firmware, Qualcomm Qca6678Aq Firmware, Qualcomm Ipq6018 Firmware, Qualcomm Qcm4290 Firmware, Qualcomm Snapdragon 730 Mobile Platform Firmware, Qualcomm Qcn5154 Firmware, Qualcomm Ipq8074 Firmware, Qualcomm Qca1062 Firmware, Qualcomm Snapdragon Xr1 Platform Firmware, Qualcomm Csra6620 Firmware, Qualcomm Qca8081 Firmware, Qualcomm Qca6554A Firmware, Qualcomm Ssg2115P Firmware, Qualcomm Qca8082 Firmware, Qualcomm Qca9984 Firmware, Qualcomm Ipq8068 Firmware, Qualcomm Qcf8001 Firmware, Qualcomm Qca8072 Firmware, Qualcomm Ipq4028 Firmware, Qualcomm Snapdragon 660 Mobile Platform Firmware, Qualcomm Qcc2073 Firmware, Qualcomm Snapdragon 8C Compute Platform Firmware, Qualcomm Ipq6000 Firmware, Qualcomm Ipq8078A Firmware, Qualcomm Snapdragon 480\+ 5G Mobile Platform Firmware, Qualcomm Snapdragon 480 5G Mobile Platform Firmware, Qualcomm Qcs7230 Firmware, Qualcomm Ssg2125P Firmware, Qualcomm Qcn5054 Firmware, Qualcomm Wcd9371 Firmware, Qualcomm Sa4155P Firmware, Qualcomm Qca6430 Firmware, Qualcomm Sd675 Firmware, Qualcomm Snapdragon 712 Mobile Platform Firmware, Qualcomm Qca8337 Firmware, Qualcomm Immersive Home 3210 Platform Firmware, Qualcomm Sa6155P Firmware, Qualcomm Snapdragon 730G Mobile Platform Firmware, Qualcomm Snapdragon X50 5G Modem-Rf System Firmware, Qualcomm Wsa8830 Firmware, Qualcomm Snapdragon 888\+ 5G Mobile Platform Firmware, Qualcomm Ipq5028 Firmware, Qualcomm Snapdragon 670 Mobile Platform Firmware, Qualcomm Wcd9326 Firmware, Qualcomm Sxr1120 Firmware, Qualcomm Qcs6490 Firmware, Qualcomm Sw5100 Firmware" CVE-2023-33110,"The session index variable in PCM host voice audio driver initialized before PCM open, accessed during event callback from ADSP and reset during PCM close may lead to race condition between event callback - PCM close and reset session index causing memory corruption.",7.8,CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,"Qualcomm Snapdragon 8Cx Gen 3 Compute Platform Firmware, Qualcomm Wcn3988 Firmware, Qualcomm Wcd9375 Firmware, Qualcomm Snapdragon 888 5G Mobile Platform Firmware, Qualcomm Snapdragon 630 Mobile Platform Firmware, Qualcomm Snapdragon 855\+\/860 Mobile Platform Firmware, Qualcomm Wsa8832 Firmware, Qualcomm Wcn3999 Firmware, Qualcomm Snapdragon 425 Mobile Platform Firmware, Qualcomm Snapdragon 636 Mobile Platform Firmware, Qualcomm Snapdragon X24 Lte Modem Firmware, Qualcomm Wcd9370 Firmware, Qualcomm Wcn3610 Firmware, Qualcomm Snapdragon 450 Mobile Platform Firmware, Qualcomm Wcd9330 Firmware, Qualcomm Wcn3615 Firmware, Qualcomm Snapdragon Wear 4100\+ Platform Firmware, Qualcomm Snapdragon 865 5G Mobile Platform Firmware, Qualcomm Snapdragon 820 Automotive Platform Firmware, Qualcomm Snapdragon Wear 1300 Platform Firmware, Qualcomm Snapdragon 765 5G Mobile Platform Firmware, Qualcomm Snapdragon 430 Mobile Platform Firmware, Qualcomm Snapdragon X5 Lte Modem Firmware, Qualcomm Wcn3660B Firmware, Qualcomm Snapdragon 768G 5G Mobile Platform Firmware, Qualcomm Wcd9360 Firmware, Qualcomm Snapdragon 780G 5G Mobile Platform Firmware, Qualcomm Snapdragon 665 Mobile Platform Firmware, Qualcomm Snapdragon 662 Mobile Platform Firmware, Qualcomm Snapdragon 7C Gen 2 Compute Platform Firmware, Qualcomm Wcd9385 Firmware, Qualcomm Snapdragon 460 Mobile Platform Firmware, Qualcomm Snapdragon Xr2\+ Gen 1 Platform Firmware, Qualcomm Snapdragon 855 Mobile Platform Firmware, Qualcomm Snapdragon 680 4G Mobile Platform Firmware, Qualcomm Snapdragon 8Cx Gen 2 5G Compute Platform Firmware, Qualcomm Snapdragon Wear 2100 Platform Firmware, Qualcomm Sxr1230P Firmware, Qualcomm Snapdragon 782G Mobile Platform Firmware, Qualcomm Wcd9380 Firmware, Qualcomm Snapdragon 865\+ 5G Mobile Platform Firmware, Qualcomm Snapdragon W5\+ Gen 1 Wearable Platform Firmware, Qualcomm Snapdragon 8Cx Compute Platform Firmware, Qualcomm Snapdragon X70 Modem-Rf System Firmware, Qualcomm Snapdragon 625 Mobile Platform Firmware, Qualcomm Snapdragon Auto 4G Modem Firmware, Qualcomm Wcn3950 Firmware, Qualcomm Snapdragon 845 Mobile Platform Firmware, Qualcomm Snapdragon 720G Mobile Platform Firmware, Qualcomm Sxr2130 Firmware, Qualcomm Wcd9335 Firmware, Qualcomm Wsa8810 Firmware, Qualcomm Snapdragon 821 Mobile Platform Firmware, Qualcomm Snapdragon 850 Mobile Compute Platform Firmware, Qualcomm Snapdragon 730 Mobile Platform Firmware, Qualcomm Snapdragon 675 Mobile Platform Firmware, Qualcomm Wsa8815 Firmware, Qualcomm Snapdragon 820 Mobile Platform Firmware, Qualcomm Snapdragon Xr1 Platform Firmware, Qualcomm Snapdragon 439 Mobile Platform Firmware, Qualcomm Snapdragon Xr2 5G Platform Firmware, Qualcomm Snapdragon 695 5G Mobile Platform Firmware, Qualcomm Snapdragon 7C\+ Gen 3 Compute Firmware, Qualcomm Wsa8835 Firmware, Qualcomm Snapdragon 835 Mobile Pc Platform Firmware, Qualcomm Snapdragon 626 Mobile Platform Firmware, Qualcomm Wcn3980 Firmware, Qualcomm Snapdragon 8\+ Gen 1 Mobile Platform Firmware, Qualcomm Ssg2115P Firmware, Qualcomm Snapdragon Ar2 Gen 1 Platform Firmware, Qualcomm Snapdragon 660 Mobile Platform Firmware, Qualcomm Wcn3990 Firmware, Qualcomm Snapdragon Wear 2500 Platform Firmware, Qualcomm Wcn3620 Firmware, Qualcomm Wcd9306 Firmware, Qualcomm Snapdragon 632 Mobile Platform Firmware, Qualcomm Snapdragon 8 Gen 1 Mobile Platform Firmware, Qualcomm Wcn3910 Firmware, Qualcomm Snapdragon 8C Compute Platform Firmware, Qualcomm Snapdragon Wear 3100 Platform Firmware, Qualcomm Snapdragon 427 Mobile Platform Firmware, Qualcomm Snapdragon 435 Mobile Platform Firmware, Qualcomm Snapdragon 480\+ 5G Mobile Platform Firmware, Qualcomm Snapdragon 480 5G Mobile Platform Firmware, Qualcomm Snapdragon X12 Lte Modem Firmware, Qualcomm Sw5100P Firmware, Qualcomm Vision Intelligence 100 Platform Firmware, Qualcomm Ssg2125P Firmware, Qualcomm Wcd9371 Firmware, Qualcomm Snapdragon X55 5G Modem-Rf System Firmware, Qualcomm Wcn3680B Firmware, Qualcomm Snapdragon 712 Mobile Platform Firmware, Qualcomm Snapdragon 429 Mobile Platform Firmware, Qualcomm Snapdragon 765G 5G Mobile Platform Firmware, Qualcomm Wcn3660 Firmware, Qualcomm Snapdragon 710 Mobile Platform Firmware, Qualcomm Sxr2230P Firmware, Qualcomm Wcn6740 Firmware, Qualcomm Snapdragon 870 5G Mobile Platform Firmware, Qualcomm Snapdragon 778G 5G Mobile Platform Firmware, Qualcomm Snapdragon 685 4G Mobile Platform Firmware, Qualcomm Snapdragon 690 5G Mobile Platform Firmware, Qualcomm Snapdragon 750G 5G Mobile Platform Firmware, Qualcomm Wcn3680 Firmware, Qualcomm Snapdragon 730G Mobile Platform Firmware, Qualcomm Snapdragon X50 5G Modem-Rf System Firmware, Qualcomm Wsa8830 Firmware, Qualcomm Wcd9341 Firmware, Qualcomm Snapdragon 888\+ 5G Mobile Platform Firmware, Qualcomm Vision Intelligence 300 Platform Firmware, Qualcomm Snapdragon 7C Compute Platform Firmware, Qualcomm Snapdragon X65 5G Modem-Rf System Firmware, Qualcomm Snapdragon 670 Mobile Platform Firmware, Qualcomm Vision Intelligence 400 Platform Firmware, Qualcomm Wcd9340 Firmware, Qualcomm Vision Intelligence 200 Platform Firmware, Qualcomm Snapdragon 778G\+ 5G Mobile Platform Firmware, Qualcomm Wcd9326 Firmware, Qualcomm Snapdragon Auto 5G Modem-Rf Firmware, Qualcomm Snapdragon 678 Mobile Platform Firmware, Qualcomm Sxr1120 Firmware, Qualcomm Snapdragon 732G Mobile Platform Firmware, Qualcomm Sw5100 Firmware" CVE-2023-33112,"Transient DOS when WLAN firmware receives ""reassoc response"" frame including RIC_DATA element.",7.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,"Qualcomm Qca6174A Firmware, Qualcomm Wcn3988 Firmware, Qualcomm Wcd9375 Firmware, Qualcomm Wcd9390 Firmware, Qualcomm Qrb5165N Firmware, Qualcomm Qualcomm Video Collaboration Vc3 Platform Firmware, Qualcomm Qcs8550 Firmware, Qualcomm Snapdragon 888 5G Mobile Platform Firmware, Qualcomm Snapdragon 4 Gen 2 Mobile Platform Firmware, Qualcomm Qca6797Aq Firmware, Qualcomm Sa6150P Firmware, Qualcomm Wsa8832 Firmware, Qualcomm Qam8295P Firmware, Qualcomm Qcs8250 Firmware, Qualcomm Wcd9370 Firmware, Qualcomm Wsa8845H Firmware, Qualcomm Qdx1011 Firmware, Qualcomm Qcs4490 Firmware, Qualcomm Qcm6490 Firmware, Qualcomm Qca6574A Firmware, Qualcomm Qcs610 Firmware, Qualcomm Qca6574Au Firmware, Qualcomm Qdu1110 Firmware, Qualcomm Mdm9650 Firmware, Qualcomm Sd 8 Gen1 5G Firmware, Qualcomm Snapdragon 820 Automotive Platform Firmware, Qualcomm Qam8775P Firmware, Qualcomm Snapdragon 4 Gen 1 Mobile Platform Firmware, Qualcomm Snapdragon 780G 5G Mobile Platform Firmware, Qualcomm Qca6574 Firmware, Qualcomm Wcd9385 Firmware, Qualcomm Snapdragon 680 4G Mobile Platform Firmware, Qualcomm Qcn9024 Firmware, Qualcomm Sxr1230P Firmware, Qualcomm Snapdragon 782G Mobile Platform Firmware, Qualcomm Wcd9380 Firmware, Qualcomm Sm8550P Firmware, Qualcomm Snapdragon W5\+ Gen 1 Wearable Platform Firmware, Qualcomm Smart Audio 400 Platform Firmware, Qualcomm Snapdragon 8\+ Gen 2 Mobile Platform Firmware, Qualcomm Sa8295P Firmware, Qualcomm Qca6698Aq Firmware, Qualcomm Ar8035 Firmware, Qualcomm Robotics Rb5 Platform Firmware, Qualcomm Qcn9012 Firmware, Qualcomm Wcn3950 Firmware, Qualcomm Qualcomm Video Collaboration Vc1 Platform Firmware, Qualcomm Sa6145P Firmware, Qualcomm Sa8195P Firmware, Qualcomm Wcd9335 Firmware, Qualcomm Wsa8810 Firmware, Qualcomm Qcs410 Firmware, Qualcomm Sa8145P Firmware, Qualcomm Wsa8815 Firmware, Qualcomm Sd888 Firmware, Qualcomm Qru1052 Firmware, Qualcomm Fastconnect 6700 Firmware, Qualcomm Qdu1210 Firmware, Qualcomm Qca6696 Firmware, Qualcomm Csra6620 Firmware, Qualcomm Qca6391 Firmware, Qualcomm Qca8081 Firmware, Qualcomm Snapdragon 695 5G Mobile Platform Firmware, Qualcomm Snapdragon 7C\+ Gen 3 Compute Firmware, Qualcomm Wsa8835 Firmware, Qualcomm Qualcomm Video Collaboration Vc5 Platform Firmware, Qualcomm Qca6554A Firmware, Qualcomm Wcn3980 Firmware, Qualcomm Snapdragon 8\+ Gen 1 Mobile Platform Firmware, Qualcomm Qam8650P Firmware, Qualcomm Qcm4490 Firmware, Qualcomm Ssg2115P Firmware, Qualcomm Flight Rb5 5G Platform Firmware, Qualcomm Snapdragon Ar2 Gen 1 Platform Firmware, Qualcomm Snapdragon 8 Gen 2 Mobile Platform Firmware, Qualcomm Qcn6024 Firmware, Qualcomm Snapdragon 8 Gen 1 Mobile Platform Firmware, Qualcomm Sg8275P Firmware, Qualcomm Qdu1000 Firmware, Qualcomm Qru1062 Firmware, Qualcomm Wsa8840 Firmware, Qualcomm Snapdragon 480\+ 5G Mobile Platform Firmware, Qualcomm Snapdragon 480 5G Mobile Platform Firmware, Qualcomm Qru1032 Firmware, Qualcomm Sm7315 Firmware, Qualcomm Qcs7230 Firmware, Qualcomm Snapdragon X12 Lte Modem Firmware, Qualcomm Sw5100P Firmware, Qualcomm Sa8255P Firmware, Qualcomm Ssg2125P Firmware, Qualcomm Qdx1010 Firmware, Qualcomm Sa4155P Firmware, Qualcomm Fastconnect 6200 Firmware, Qualcomm Wsa8845 Firmware, Qualcomm Qca9377 Firmware, Qualcomm Qca8337 Firmware, Qualcomm Sxr2230P Firmware, Qualcomm Qam8255P Firmware, Qualcomm Snapdragon 778G 5G Mobile Platform Firmware, Qualcomm Snapdragon 685 4G Mobile Platform Firmware, Qualcomm Qdu1010 Firmware, Qualcomm Qcm4325 Firmware, Qualcomm Sa6155P Firmware, Qualcomm Wcd9395 Firmware, Qualcomm Sm7325P Firmware, Qualcomm Csra6640 Firmware, Qualcomm Wsa8830 Firmware, Qualcomm Wcd9341 Firmware, Qualcomm Qrb5165M Firmware, Qualcomm Snapdragon 888\+ 5G Mobile Platform Firmware, Qualcomm Sa8155P Firmware, Qualcomm Qca6595 Firmware, Qualcomm Sa4150P Firmware, Qualcomm Sa8150P Firmware, Qualcomm Fastconnect 6900 Firmware, Qualcomm Qca6564Au Firmware, Qualcomm Fastconnect 7800 Firmware, Qualcomm Snapdragon X65 5G Modem-Rf System Firmware, Qualcomm Snapdragon 778G\+ 5G Mobile Platform Firmware, Qualcomm Qca6584Au Firmware, Qualcomm Snapdragon Auto 5G Modem-Rf Firmware, Qualcomm Qca6595Au Firmware, Qualcomm Qcn9011 Firmware, Qualcomm Qcm8550 Firmware, Qualcomm Wcn6740 Firmware, Qualcomm Qcs6490 Firmware, Qualcomm Sw5100 Firmware" CVE-2023-33113,Memory corruption when resource manager sends the host kernel a reply message with multiple fragments.,8.4,CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,"Qualcomm Qca6174A Firmware, Qualcomm Wcn3988 Firmware, Qualcomm Wcd9375 Firmware, Qualcomm Wcd9390 Firmware, Qualcomm Qrb5165N Firmware, Qualcomm Qualcomm Video Collaboration Vc3 Platform Firmware, Qualcomm Qcs8550 Firmware, Qualcomm Snapdragon 888 5G Mobile Platform Firmware, Qualcomm Snapdragon 4 Gen 2 Mobile Platform Firmware, Qualcomm Qca6797Aq Firmware, Qualcomm Sa6150P Firmware, Qualcomm Wsa8832 Firmware, Qualcomm Qam8295P Firmware, Qualcomm Qcs8250 Firmware, Qualcomm Wcd9370 Firmware, Qualcomm Wsa8845H Firmware, Qualcomm Qdx1011 Firmware, Qualcomm Qcs4490 Firmware, Qualcomm Qcm6490 Firmware, Qualcomm Qca6574A Firmware, Qualcomm Qcs610 Firmware, Qualcomm Qca6574Au Firmware, Qualcomm Qdu1110 Firmware, Qualcomm Mdm9650 Firmware, Qualcomm Sd 8 Gen1 5G Firmware, Qualcomm Snapdragon 820 Automotive Platform Firmware, Qualcomm Qam8775P Firmware, Qualcomm Snapdragon 4 Gen 1 Mobile Platform Firmware, Qualcomm Snapdragon 780G 5G Mobile Platform Firmware, Qualcomm Qca6574 Firmware, Qualcomm Wcd9385 Firmware, Qualcomm Snapdragon 680 4G Mobile Platform Firmware, Qualcomm Qcn9024 Firmware, Qualcomm Sxr1230P Firmware, Qualcomm Snapdragon 782G Mobile Platform Firmware, Qualcomm Wcd9380 Firmware, Qualcomm Sm8550P Firmware, Qualcomm Snapdragon W5\+ Gen 1 Wearable Platform Firmware, Qualcomm Smart Audio 400 Platform Firmware, Qualcomm Snapdragon 8\+ Gen 2 Mobile Platform Firmware, Qualcomm Sa8295P Firmware, Qualcomm Qca6698Aq Firmware, Qualcomm Ar8035 Firmware, Qualcomm Robotics Rb5 Platform Firmware, Qualcomm Qcn9012 Firmware, Qualcomm Wcn3950 Firmware, Qualcomm Qualcomm Video Collaboration Vc1 Platform Firmware, Qualcomm Sa6145P Firmware, Qualcomm Sa8195P Firmware, Qualcomm Wcd9335 Firmware, Qualcomm Wsa8810 Firmware, Qualcomm Qcs410 Firmware, Qualcomm Sa8145P Firmware, Qualcomm Wsa8815 Firmware, Qualcomm Sd888 Firmware, Qualcomm Qru1052 Firmware, Qualcomm Fastconnect 6700 Firmware, Qualcomm Qdu1210 Firmware, Qualcomm Qca6696 Firmware, Qualcomm Csra6620 Firmware, Qualcomm Qca6391 Firmware, Qualcomm Qca8081 Firmware, Qualcomm Snapdragon 695 5G Mobile Platform Firmware, Qualcomm Snapdragon 7C\+ Gen 3 Compute Firmware, Qualcomm Wsa8835 Firmware, Qualcomm Qualcomm Video Collaboration Vc5 Platform Firmware, Qualcomm Qca6554A Firmware, Qualcomm Wcn3980 Firmware, Qualcomm Snapdragon 8\+ Gen 1 Mobile Platform Firmware, Qualcomm Qam8650P Firmware, Qualcomm Qcm4490 Firmware, Qualcomm Ssg2115P Firmware, Qualcomm Flight Rb5 5G Platform Firmware, Qualcomm Snapdragon Ar2 Gen 1 Platform Firmware, Qualcomm Snapdragon 8 Gen 2 Mobile Platform Firmware, Qualcomm Qcn6024 Firmware, Qualcomm Snapdragon 8 Gen 1 Mobile Platform Firmware, Qualcomm Sg8275P Firmware, Qualcomm Qdu1000 Firmware, Qualcomm Qru1062 Firmware, Qualcomm Wsa8840 Firmware, Qualcomm Snapdragon 480\+ 5G Mobile Platform Firmware, Qualcomm Snapdragon 480 5G Mobile Platform Firmware, Qualcomm Qru1032 Firmware, Qualcomm Sm7315 Firmware, Qualcomm Qcs7230 Firmware, Qualcomm Snapdragon X12 Lte Modem Firmware, Qualcomm Sw5100P Firmware, Qualcomm Sa8255P Firmware, Qualcomm Ssg2125P Firmware, Qualcomm Qdx1010 Firmware, Qualcomm Sa4155P Firmware, Qualcomm Fastconnect 6200 Firmware, Qualcomm Wsa8845 Firmware, Qualcomm Qca9377 Firmware, Qualcomm Qca8337 Firmware, Qualcomm Sxr2230P Firmware, Qualcomm Qam8255P Firmware, Qualcomm Snapdragon 778G 5G Mobile Platform Firmware, Qualcomm Snapdragon 685 4G Mobile Platform Firmware, Qualcomm Qdu1010 Firmware, Qualcomm Qcm4325 Firmware, Qualcomm Sa6155P Firmware, Qualcomm Wcd9395 Firmware, Qualcomm Sm7325P Firmware, Qualcomm Csra6640 Firmware, Qualcomm Wsa8830 Firmware, Qualcomm Wcd9341 Firmware, Qualcomm Qrb5165M Firmware, Qualcomm Snapdragon 888\+ 5G Mobile Platform Firmware, Qualcomm Sa8155P Firmware, Qualcomm Qca6595 Firmware, Qualcomm Sa4150P Firmware, Qualcomm Sa8150P Firmware, Qualcomm Fastconnect 6900 Firmware, Qualcomm Qca6564Au Firmware, Qualcomm Fastconnect 7800 Firmware, Qualcomm Snapdragon X65 5G Modem-Rf System Firmware, Qualcomm Snapdragon 778G\+ 5G Mobile Platform Firmware, Qualcomm Qca6584Au Firmware, Qualcomm Snapdragon Auto 5G Modem-Rf Firmware, Qualcomm Qca6595Au Firmware, Qualcomm Qcn9011 Firmware, Qualcomm Qcm8550 Firmware, Qualcomm Wcn6740 Firmware, Qualcomm Qcs6490 Firmware, Qualcomm Sw5100 Firmware" CVE-2023-33114,"Memory corruption while running NPU, when NETWORK_UNLOAD and (NETWORK_UNLOAD or NETWORK_EXECUTE_V2) commands are submitted at the same time.",8.4,CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,"Qualcomm Wcn3988 Firmware, Qualcomm Sd865 5G Firmware, Qualcomm Wcd9375 Firmware, Qualcomm Qcs6125 Firmware, Qualcomm Qrb5165N Firmware, Qualcomm Qualcomm Video Collaboration Vc3 Platform Firmware, Qualcomm Sa6150P Firmware, Qualcomm Snapdragon 855\+\/860 Mobile Platform Firmware, Qualcomm Qam8295P Firmware, Qualcomm Qcs8250 Firmware, Qualcomm Wcd9370 Firmware, Qualcomm Wcn3610 Firmware, Qualcomm Qca6574A Firmware, Qualcomm Sm7250P Firmware, Qualcomm Qcs610 Firmware, Qualcomm Qca6574Au Firmware, Qualcomm Snapdragon Wear 4100\+ Platform Firmware, Qualcomm Snapdragon 865 5G Mobile Platform Firmware, Qualcomm Snapdragon 765 5G Mobile Platform Firmware, Qualcomm Wcn3660B Firmware, Qualcomm Snapdragon 768G 5G Mobile Platform Firmware, Qualcomm Qcm6125 Firmware, Qualcomm Sd730 Firmware, Qualcomm Snapdragon 665 Mobile Platform Firmware, Qualcomm Qca6420 Firmware, Qualcomm Qca6574 Firmware, Qualcomm Sm4125 Firmware, Qualcomm Snapdragon 662 Mobile Platform Firmware, Qualcomm Aqt1000 Firmware, Qualcomm Wcd9385 Firmware, Qualcomm Snapdragon 460 Mobile Platform Firmware, Qualcomm Snapdragon Xr2\+ Gen 1 Platform Firmware, Qualcomm Snapdragon 855 Mobile Platform Firmware, Qualcomm Snapdragon 680 4G Mobile Platform Firmware, Qualcomm C-V2X 9150 Firmware, Qualcomm Wcd9380 Firmware, Qualcomm Snapdragon 865\+ 5G Mobile Platform Firmware, Qualcomm Snapdragon W5\+ Gen 1 Wearable Platform Firmware, Qualcomm Smart Audio 400 Platform Firmware, Qualcomm Sa8295P Firmware, Qualcomm Qca6436 Firmware, Qualcomm Qca6698Aq Firmware, Qualcomm Ar8035 Firmware, Qualcomm Robotics Rb5 Platform Firmware, Qualcomm Qcn9012 Firmware, Qualcomm Wcn3950 Firmware, Qualcomm Qualcomm Video Collaboration Vc1 Platform Firmware, Qualcomm Sa6145P Firmware, Qualcomm Sa8195P Firmware, Qualcomm Wcd9335 Firmware, Qualcomm Snapdragon 720G Mobile Platform Firmware, Qualcomm Sxr2130 Firmware, Qualcomm Wsa8810 Firmware, Qualcomm Sd660 Firmware, Qualcomm Qcs410 Firmware, Qualcomm Snapdragon 730 Mobile Platform Firmware, Qualcomm Snapdragon 675 Mobile Platform Firmware, Qualcomm Sa8145P Firmware, Qualcomm Wsa8815 Firmware, Qualcomm Ar8031 Firmware, Qualcomm Sd855 Firmware, Qualcomm Fastconnect 6700 Firmware, Qualcomm Snapdragon Xr2 5G Platform Firmware, Qualcomm Qca6696 Firmware, Qualcomm Csra6620 Firmware, Qualcomm Qca6391 Firmware, Qualcomm Wsa8835 Firmware, Qualcomm Qualcomm Video Collaboration Vc5 Platform Firmware, Qualcomm Wcn3980 Firmware, Qualcomm Flight Rb5 5G Platform Firmware, Qualcomm Qca6421 Firmware, Qualcomm Snapdragon 660 Mobile Platform Firmware, Qualcomm Wcn3990 Firmware, Qualcomm Wcn3910 Firmware, Qualcomm Sw5100P Firmware, Qualcomm Sm6250 Firmware, Qualcomm 315 5G Iot Modem Firmware, Qualcomm Sa4155P Firmware, Qualcomm Snapdragon X55 5G Modem-Rf System Firmware, Qualcomm Qca6430 Firmware, Qualcomm Fastconnect 6200 Firmware, Qualcomm Wcn3680B Firmware, Qualcomm Snapdragon 765G 5G Mobile Platform Firmware, Qualcomm Fastconnect 6800 Firmware, Qualcomm Sdx55 Firmware, Qualcomm Qca8337 Firmware, Qualcomm Snapdragon 870 5G Mobile Platform Firmware, Qualcomm Qca6431 Firmware, Qualcomm Snapdragon 685 4G Mobile Platform Firmware, Qualcomm Sa6155P Firmware, Qualcomm Snapdragon 690 5G Mobile Platform Firmware, Qualcomm Snapdragon 750G 5G Mobile Platform Firmware, Qualcomm Csra6640 Firmware, Qualcomm Snapdragon 730G Mobile Platform Firmware, Qualcomm Snapdragon X50 5G Modem-Rf System Firmware, Qualcomm Wsa8830 Firmware, Qualcomm Wcd9341 Firmware, Qualcomm Qrb5165M Firmware, Qualcomm Sa8155P Firmware, Qualcomm Qca6595 Firmware, Qualcomm Sa4150P Firmware, Qualcomm Sa8150P Firmware, Qualcomm Fastconnect 6900 Firmware, Qualcomm Qca6426 Firmware, Qualcomm Wcd9326 Firmware, Qualcomm Snapdragon Auto 5G Modem-Rf Firmware, Qualcomm Qca6595Au Firmware, Qualcomm Qcn9011 Firmware, Qualcomm Snapdragon 678 Mobile Platform Firmware, Qualcomm Snapdragon 732G Mobile Platform Firmware, Qualcomm Qcs6490 Firmware, Qualcomm Sw5100 Firmware" CVE-2023-33116,Transient DOS while parsing ieee80211_parse_mscs_ie in WIN WLAN driver.,7.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,"Qualcomm Ar9380 Firmware, Qualcomm Qrb5165N Firmware, Qualcomm Qcn9074 Firmware, Qualcomm Ipq6010 Firmware, Qualcomm Qca9886 Firmware, Qualcomm Qcn9274 Firmware, Qualcomm Ipq9008 Firmware, Qualcomm Ipq4018 Firmware, Qualcomm Qcn5052 Firmware, Qualcomm Ipq8074A Firmware, Qualcomm Qca9898 Firmware, Qualcomm Ipq8174 Firmware, Qualcomm Qca4024 Firmware, Qualcomm Qca9888 Firmware, Qualcomm Qcn6122 Firmware, Qualcomm Ipq9574 Firmware, Qualcomm Ipq8078 Firmware, Qualcomm Qca8386 Firmware, Qualcomm Qca0000 Firmware, Qualcomm Qcn5124 Firmware, Qualcomm Wcd9385 Firmware, Qualcomm Qca8084 Firmware, Qualcomm Ipq4019 Firmware, Qualcomm Ipq8070 Firmware, Qualcomm Ipq8072A Firmware, Qualcomm Qca9980 Firmware, Qualcomm Qcn9024 Firmware, Qualcomm Immersive Home 214 Platform Firmware, Qualcomm Qcn5122 Firmware, Qualcomm Wcd9380 Firmware, Qualcomm Ipq8065 Firmware, Qualcomm Qca7500 Firmware, Qualcomm Qcn6023 Firmware, Qualcomm Ar8035 Firmware, Qualcomm Qcn6274 Firmware, Qualcomm Qcn9070 Firmware, Qualcomm Qca9880 Firmware, Qualcomm Robotics Rb5 Platform Firmware, Qualcomm Qcn5152 Firmware, Qualcomm Qcn9012 Firmware, Qualcomm Immersive Home 316 Platform Firmware, Qualcomm Csr8811 Firmware, Qualcomm Ipq6018 Firmware, Qualcomm Sdx65M Firmware, Qualcomm Ipq4029 Firmware, Qualcomm Qfw7114 Firmware, Qualcomm Qcn5154 Firmware, Qualcomm Ipq8070A Firmware, Qualcomm Ipq8076 Firmware, Qualcomm Qca6391 Firmware, Qualcomm Qca8081 Firmware, Qualcomm Qca9985 Firmware, Qualcomm Wcn3980 Firmware, Qualcomm Qcn5164 Firmware, Qualcomm Immersive Home 216 Platform Firmware, Qualcomm Qca8082 Firmware, Qualcomm Qca9984 Firmware, Qualcomm Flight Rb5 5G Platform Firmware, Qualcomm Ipq8068 Firmware, Qualcomm Qcf8001 Firmware, Qualcomm Ipq8173 Firmware, Qualcomm Ipq5010 Firmware, Qualcomm Qca8075 Firmware, Qualcomm Ipq4028 Firmware, Qualcomm Qcn6024 Firmware, Qualcomm Ipq6028 Firmware, Qualcomm Ipq6000 Firmware, Qualcomm Qcn9013 Firmware, Qualcomm Ipq8078A Firmware, Qualcomm Qcc710 Firmware, Qualcomm Qcn5024 Firmware, Qualcomm Qcn9100 Firmware, Qualcomm Immersive Home 326 Platform Firmware, Qualcomm Qca9992 Firmware, Qualcomm Qfw7124 Firmware, Qualcomm Ipq9570 Firmware, Qualcomm Qca9990 Firmware, Qualcomm Qcn6224 Firmware, Qualcomm Qcn9072 Firmware, Qualcomm Sdx55 Firmware, Qualcomm Qcn6112 Firmware, Qualcomm Qca8085 Firmware, Qualcomm Qca8337 Firmware, Qualcomm Ipq8071A Firmware, Qualcomm Qcn5022 Firmware, Qualcomm Immersive Home 3210 Platform Firmware, Qualcomm Qca9889 Firmware, Qualcomm Qcn9022 Firmware, Qualcomm Qrb5165M Firmware, Qualcomm Snapdragon X75 5G Modem-Rf System Firmware, Qualcomm Fastconnect 6900 Firmware, Qualcomm Immersive Home 318 Platform Firmware, Qualcomm Ipq8064 Firmware, Qualcomm Ipq8076A Firmware, Qualcomm Ipq5028 Firmware, Qualcomm Fastconnect 7800 Firmware, Qualcomm Snapdragon X65 5G Modem-Rf System Firmware, Qualcomm Wcd9340 Firmware, Qualcomm Qca9994 Firmware, Qualcomm Qcn9011 Firmware, Qualcomm Qcn9000 Firmware, Qualcomm Qcn6132 Firmware" CVE-2023-33117,Memory corruption when HLOS allocates the response payload buffer to copy the data received from ADSP in response to AVCS_LOAD_MODULE command.,7.8,CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,"Qualcomm Qca6174A Firmware, Qualcomm Wcn3988 Firmware, Qualcomm Sd865 5G Firmware, Qualcomm Wcd9375 Firmware, Qualcomm Wcd9390 Firmware, Qualcomm Qrb5165N Firmware, Qualcomm Qualcomm Video Collaboration Vc3 Platform Firmware, Qualcomm Qcs8550 Firmware, Qualcomm Snapdragon 888 5G Mobile Platform Firmware, Qualcomm Qca6797Aq Firmware, Qualcomm Sa6150P Firmware, Qualcomm Qam8295P Firmware, Qualcomm Qcs8250 Firmware, Qualcomm Wcd9370 Firmware, Qualcomm Wsa8845H Firmware, Qualcomm Qcm6490 Firmware, Qualcomm Qca6574A Firmware, Qualcomm Sm7250P Firmware, Qualcomm Qcs610 Firmware, Qualcomm Qca6574Au Firmware, Qualcomm Wcn3615 Firmware, Qualcomm Snapdragon 865 5G Mobile Platform Firmware, Qualcomm Snapdragon 765 5G Mobile Platform Firmware, Qualcomm Wcn3660B Firmware, Qualcomm Qcs2290 Firmware, Qualcomm Snapdragon 768G 5G Mobile Platform Firmware, Qualcomm Qam8775P Firmware, Qualcomm Snapdragon 4 Gen 1 Mobile Platform Firmware, Qualcomm Snapdragon 780G 5G Mobile Platform Firmware, Qualcomm Qca6574 Firmware, Qualcomm Sm4125 Firmware, Qualcomm Snapdragon 662 Mobile Platform Firmware, Qualcomm Wcd9385 Firmware, Qualcomm Snapdragon 460 Mobile Platform Firmware, Qualcomm Snapdragon Xr2\+ Gen 1 Platform Firmware, Qualcomm Snapdragon 680 4G Mobile Platform Firmware, Qualcomm Snapdragon 782G Mobile Platform Firmware, Qualcomm Wcd9380 Firmware, Qualcomm Sm8550P Firmware, Qualcomm Snapdragon 865\+ 5G Mobile Platform Firmware, Qualcomm Snapdragon W5\+ Gen 1 Wearable Platform Firmware, Qualcomm Smart Audio 400 Platform Firmware, Qualcomm Snapdragon 8\+ Gen 2 Mobile Platform Firmware, Qualcomm Sa8295P Firmware, Qualcomm Qca6436 Firmware, Qualcomm Qca6698Aq Firmware, Qualcomm Ar8035 Firmware, Qualcomm Qcn6274 Firmware, Qualcomm Robotics Rb5 Platform Firmware, Qualcomm Qcn9012 Firmware, Qualcomm Wcn3950 Firmware, Qualcomm Qualcomm Video Collaboration Vc1 Platform Firmware, Qualcomm Sa6145P Firmware, Qualcomm Sa8195P Firmware, Qualcomm Wcd9335 Firmware, Qualcomm Wsa8810 Firmware, Qualcomm Sxr2130 Firmware, Qualcomm Qcs4290 Firmware, Qualcomm Sd660 Firmware, Qualcomm Qcm4290 Firmware, Qualcomm Qcs410 Firmware, Qualcomm Qfw7114 Firmware, Qualcomm Sa8145P Firmware, Qualcomm Wsa8815 Firmware, Qualcomm Sd888 Firmware, Qualcomm Qcm2290 Firmware, Qualcomm Fastconnect 6700 Firmware, Qualcomm Snapdragon Xr2 5G Platform Firmware, Qualcomm Qca6696 Firmware, Qualcomm Csra6620 Firmware, Qualcomm Qca6391 Firmware, Qualcomm Qca8081 Firmware, Qualcomm Snapdragon 695 5G Mobile Platform Firmware, Qualcomm Snapdragon 7C\+ Gen 3 Compute Firmware, Qualcomm Wsa8835 Firmware, Qualcomm Qualcomm Video Collaboration Vc5 Platform Firmware, Qualcomm Qualcomm 215 Mobile Platform Firmware, Qualcomm Wcn3980 Firmware, Qualcomm Qam8650P Firmware, Qualcomm Flight Rb5 5G Platform Firmware, Qualcomm Qca6421 Firmware, Qualcomm Snapdragon 8 Gen 2 Mobile Platform Firmware, Qualcomm Snapdragon 660 Mobile Platform Firmware, Qualcomm Wcn3990 Firmware, Qualcomm Wcn3910 Firmware, Qualcomm Sg8275P Firmware, Qualcomm Wsa8840 Firmware, Qualcomm Snapdragon 480\+ 5G Mobile Platform Firmware, Qualcomm Qcc710 Firmware, Qualcomm Snapdragon 480 5G Mobile Platform Firmware, Qualcomm Sm7315 Firmware, Qualcomm Qcs7230 Firmware, Qualcomm Snapdragon X12 Lte Modem Firmware, Qualcomm Sw5100P Firmware, Qualcomm Qfw7124 Firmware, Qualcomm Sa8255P Firmware, Qualcomm Qcn6224 Firmware, Qualcomm Sa4155P Firmware, Qualcomm Snapdragon X55 5G Modem-Rf System Firmware, Qualcomm Fastconnect 6200 Firmware, Qualcomm Wcn3680B Firmware, Qualcomm Wsa8845 Firmware, Qualcomm Qca9377 Firmware, Qualcomm Snapdragon 765G 5G Mobile Platform Firmware, Qualcomm Fastconnect 6800 Firmware, Qualcomm Qca8337 Firmware, Qualcomm Snapdragon 870 5G Mobile Platform Firmware, Qualcomm Qam8255P Firmware, Qualcomm Qca6431 Firmware, Qualcomm Snapdragon 685 4G Mobile Platform Firmware, Qualcomm Snapdragon 778G 5G Mobile Platform Firmware, Qualcomm Qcm4325 Firmware, Qualcomm Sa6155P Firmware, Qualcomm Snapdragon 690 5G Mobile Platform Firmware, Qualcomm Snapdragon 750G 5G Mobile Platform Firmware, Qualcomm Wcd9395 Firmware, Qualcomm Sm7325P Firmware, Qualcomm Csra6640 Firmware, Qualcomm Sg4150P Firmware, Qualcomm Wsa8830 Firmware, Qualcomm Wcd9341 Firmware, Qualcomm Qrb5165M Firmware, Qualcomm Snapdragon 888\+ 5G Mobile Platform Firmware, Qualcomm Sa8155P Firmware, Qualcomm Snapdragon X75 5G Modem-Rf System Firmware, Qualcomm Qca6595 Firmware, Qualcomm Sa4150P Firmware, Qualcomm Sa8150P Firmware, Qualcomm Fastconnect 6900 Firmware, Qualcomm Qca6426 Firmware, Qualcomm Fastconnect 7800 Firmware, Qualcomm Wcd9340 Firmware, Qualcomm Snapdragon 778G\+ 5G Mobile Platform Firmware, Qualcomm Wcd9326 Firmware, Qualcomm Snapdragon Auto 5G Modem-Rf Firmware, Qualcomm Qca6595Au Firmware, Qualcomm Qcn9011 Firmware, Qualcomm Qcm8550 Firmware, Qualcomm Wcn6740 Firmware, Qualcomm Qcs6490 Firmware, Qualcomm Sw5100 Firmware" CVE-2023-33118,Memory corruption while processing Listen Sound Model client payload buffer when there is a request for Listen Sound session get parameter from ST HAL.,7.8,CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,"Qualcomm Qca6174A Firmware, Qualcomm Wcn3988 Firmware, Qualcomm Sd865 5G Firmware, Qualcomm Wcd9375 Firmware, Qualcomm Wcd9390 Firmware, Qualcomm Qrb5165N Firmware, Qualcomm Qualcomm Video Collaboration Vc3 Platform Firmware, Qualcomm Qcs8550 Firmware, Qualcomm Snapdragon 888 5G Mobile Platform Firmware, Qualcomm Qca6797Aq Firmware, Qualcomm Sa6150P Firmware, Qualcomm Qam8295P Firmware, Qualcomm Qcs8250 Firmware, Qualcomm Wcd9370 Firmware, Qualcomm Qcm6490 Firmware, Qualcomm Qca6574A Firmware, Qualcomm Sm7250P Firmware, Qualcomm Qcs610 Firmware, Qualcomm Qca6574Au Firmware, Qualcomm Wcn3615 Firmware, Qualcomm Snapdragon 865 5G Mobile Platform Firmware, Qualcomm Snapdragon 765 5G Mobile Platform Firmware, Qualcomm Wcn3660B Firmware, Qualcomm Qcs2290 Firmware, Qualcomm Snapdragon 768G 5G Mobile Platform Firmware, Qualcomm Qam8775P Firmware, Qualcomm Snapdragon 4 Gen 1 Mobile Platform Firmware, Qualcomm Snapdragon 780G 5G Mobile Platform Firmware, Qualcomm Qca6574 Firmware, Qualcomm Sm4125 Firmware, Qualcomm Snapdragon 662 Mobile Platform Firmware, Qualcomm Wcd9385 Firmware, Qualcomm Snapdragon 460 Mobile Platform Firmware, Qualcomm Snapdragon Xr2\+ Gen 1 Platform Firmware, Qualcomm Snapdragon 680 4G Mobile Platform Firmware, Qualcomm Snapdragon 782G Mobile Platform Firmware, Qualcomm Wcd9380 Firmware, Qualcomm Sm8550P Firmware, Qualcomm Snapdragon 865\+ 5G Mobile Platform Firmware, Qualcomm Snapdragon W5\+ Gen 1 Wearable Platform Firmware, Qualcomm Smart Audio 400 Platform Firmware, Qualcomm Snapdragon 8\+ Gen 2 Mobile Platform Firmware, Qualcomm Sa8295P Firmware, Qualcomm Qca6698Aq Firmware, Qualcomm Ar8035 Firmware, Qualcomm Qcn6274 Firmware, Qualcomm Robotics Rb5 Platform Firmware, Qualcomm Qcn9012 Firmware, Qualcomm Wcn3950 Firmware, Qualcomm Qualcomm Video Collaboration Vc1 Platform Firmware, Qualcomm Sa6145P Firmware, Qualcomm Sa8195P Firmware, Qualcomm Wcd9335 Firmware, Qualcomm Wsa8810 Firmware, Qualcomm Qcs4290 Firmware, Qualcomm Sd660 Firmware, Qualcomm Qcm4290 Firmware, Qualcomm Qcs410 Firmware, Qualcomm Qfw7114 Firmware, Qualcomm Sa8145P Firmware, Qualcomm Wsa8815 Firmware, Qualcomm Sd888 Firmware, Qualcomm Qcm2290 Firmware, Qualcomm Fastconnect 6700 Firmware, Qualcomm Snapdragon Xr2 5G Platform Firmware, Qualcomm Qca6696 Firmware, Qualcomm Csra6620 Firmware, Qualcomm Qca6391 Firmware, Qualcomm Qca8081 Firmware, Qualcomm Snapdragon 695 5G Mobile Platform Firmware, Qualcomm Snapdragon 7C\+ Gen 3 Compute Firmware, Qualcomm Wsa8835 Firmware, Qualcomm Qualcomm Video Collaboration Vc5 Platform Firmware, Qualcomm Qualcomm 215 Mobile Platform Firmware, Qualcomm Wcn3980 Firmware, Qualcomm Qam8650P Firmware, Qualcomm Flight Rb5 5G Platform Firmware, Qualcomm Snapdragon 8 Gen 2 Mobile Platform Firmware, Qualcomm Snapdragon 660 Mobile Platform Firmware, Qualcomm Wcn3990 Firmware, Qualcomm Wcn3910 Firmware, Qualcomm Sg8275P Firmware, Qualcomm Wsa8840 Firmware, Qualcomm Snapdragon 480\+ 5G Mobile Platform Firmware, Qualcomm Qcc710 Firmware, Qualcomm Snapdragon 480 5G Mobile Platform Firmware, Qualcomm Sm7315 Firmware, Qualcomm Qcs7230 Firmware, Qualcomm Snapdragon X12 Lte Modem Firmware, Qualcomm Sw5100P Firmware, Qualcomm Qfw7124 Firmware, Qualcomm Sa8255P Firmware, Qualcomm Qcn6224 Firmware, Qualcomm Sa4155P Firmware, Qualcomm Snapdragon X55 5G Modem-Rf System Firmware, Qualcomm Fastconnect 6200 Firmware, Qualcomm Wcn3680B Firmware, Qualcomm Wsa8845 Firmware, Qualcomm Qca9377 Firmware, Qualcomm Snapdragon 765G 5G Mobile Platform Firmware, Qualcomm Fastconnect 6800 Firmware, Qualcomm Qca8337 Firmware, Qualcomm Snapdragon 870 5G Mobile Platform Firmware, Qualcomm Qam8255P Firmware, Qualcomm Snapdragon 778G 5G Mobile Platform Firmware, Qualcomm Snapdragon 685 4G Mobile Platform Firmware, Qualcomm Qcm4325 Firmware, Qualcomm Sa6155P Firmware, Qualcomm Snapdragon 690 5G Mobile Platform Firmware, Qualcomm Snapdragon 750G 5G Mobile Platform Firmware, Qualcomm Wcd9395 Firmware, Qualcomm Sm7325P Firmware, Qualcomm Csra6640 Firmware, Qualcomm Sg4150P Firmware, Qualcomm Wsa8830 Firmware, Qualcomm Wcd9341 Firmware, Qualcomm Qrb5165M Firmware, Qualcomm Snapdragon 888\+ 5G Mobile Platform Firmware, Qualcomm Sa8155P Firmware, Qualcomm Snapdragon X75 5G Modem-Rf System Firmware, Qualcomm Qca6595 Firmware, Qualcomm Sa4150P Firmware, Qualcomm Sa8150P Firmware, Qualcomm Fastconnect 6900 Firmware, Qualcomm Fastconnect 7800 Firmware, Qualcomm Wcd9340 Firmware, Qualcomm Snapdragon 778G\+ 5G Mobile Platform Firmware, Qualcomm Wcd9326 Firmware, Qualcomm Snapdragon Auto 5G Modem-Rf Firmware, Qualcomm Qca6595Au Firmware, Qualcomm Qcn9011 Firmware, Qualcomm Qcm8550 Firmware, Qualcomm Wcn6740 Firmware, Qualcomm Qcs6490 Firmware, Qualcomm Sw5100 Firmware" CVE-2023-33120,Memory corruption in Audio when memory map command is executed consecutively in ADSP.,7.8,CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,"Qualcomm Msm8996Au Firmware, Qualcomm Qca6174A Firmware, Qualcomm Mdm9640 Firmware, Qualcomm Wcn3988 Firmware, Qualcomm Sd865 5G Firmware, Qualcomm Wcd9375 Firmware, Qualcomm Wcd9390 Firmware, Qualcomm Qcs6125 Firmware, Qualcomm Qrb5165N Firmware, Qualcomm Qcn9074 Firmware, Qualcomm Qcs8550 Firmware, Qualcomm Qualcomm Video Collaboration Vc3 Platform Firmware, Qualcomm Snapdragon 888 5G Mobile Platform Firmware, Qualcomm Qca6797Aq Firmware, Qualcomm Sa6150P Firmware, Qualcomm Snapdragon 855\+\/860 Mobile Platform Firmware, Qualcomm Qam8295P Firmware, Qualcomm Qca6320 Firmware, Qualcomm Sd626 Firmware, Qualcomm Snapdragon X24 Lte Modem Firmware, Qualcomm Qcs8250 Firmware, Qualcomm Smart Audio 200 Platform Firmware, Qualcomm Wcd9370 Firmware, Qualcomm Wsa8845H Firmware, Qualcomm Sd670 Firmware, Qualcomm Wcn3610 Firmware, Qualcomm Mdm9230 Firmware, Qualcomm Qcm6490 Firmware, Qualcomm Qca6574A Firmware, Qualcomm Sm7250P Firmware, Qualcomm Wcd9330 Firmware, Qualcomm Qcs610 Firmware, Qualcomm Qca6574Au Firmware, Qualcomm Wcn3615 Firmware, Qualcomm Snapdragon Wear 4100\+ Platform Firmware, Qualcomm Snapdragon 865 5G Mobile Platform Firmware, Qualcomm Mdm9650 Firmware, Qualcomm Qca9367 Firmware, Qualcomm Snapdragon 820 Automotive Platform Firmware, Qualcomm Snapdragon 765 5G Mobile Platform Firmware, Qualcomm Mdm9250 Firmware, Qualcomm Snapdragon X5 Lte Modem Firmware, Qualcomm Qcs2290 Firmware, Qualcomm Snapdragon 768G 5G Mobile Platform Firmware, Qualcomm Wcn3660B Firmware, Qualcomm Wcd9360 Firmware, Qualcomm Qcm6125 Firmware, Qualcomm Sd730 Firmware, Qualcomm Qam8775P Firmware, Qualcomm Snapdragon 4 Gen 1 Mobile Platform Firmware, Qualcomm Snapdragon 780G 5G Mobile Platform Firmware, Qualcomm Snapdragon 665 Mobile Platform Firmware, Qualcomm Qca6420 Firmware, Qualcomm Qca6574 Firmware, Qualcomm Sm4125 Firmware, Qualcomm Snapdragon 662 Mobile Platform Firmware, Qualcomm Robotics Rb3 Platform Firmware, Qualcomm Aqt1000 Firmware, Qualcomm Wcd9385 Firmware, Qualcomm Snapdragon 460 Mobile Platform Firmware, Qualcomm Snapdragon Xr2\+ Gen 1 Platform Firmware, Qualcomm Snapdragon 855 Mobile Platform Firmware, Qualcomm Snapdragon 680 4G Mobile Platform Firmware, Qualcomm Sdx20M Firmware, Qualcomm Snapdragon Wear 2100 Platform Firmware, Qualcomm C-V2X 9150 Firmware, Qualcomm Snapdragon 782G Mobile Platform Firmware, Qualcomm Wcd9380 Firmware, Qualcomm Sm8550P Firmware, Qualcomm Sa8155 Firmware, Qualcomm Snapdragon 865\+ 5G Mobile Platform Firmware, Qualcomm Smart Audio 400 Platform Firmware, Qualcomm Snapdragon W5\+ Gen 1 Wearable Platform Firmware, Qualcomm Snapdragon 8\+ Gen 2 Mobile Platform Firmware, Qualcomm Sa8295P Firmware, Qualcomm Qca6436 Firmware, Qualcomm Qca6698Aq Firmware, Qualcomm Ar8035 Firmware, Qualcomm Csrb31024 Firmware, Qualcomm Qcn6274 Firmware, Qualcomm Qca6174 Firmware, Qualcomm Mdm9630 Firmware, Qualcomm Robotics Rb5 Platform Firmware, Qualcomm Qca6564A Firmware, Qualcomm Snapdragon Auto 4G Modem Firmware, Qualcomm Sd835 Firmware, Qualcomm Qcn9012 Firmware, Qualcomm Wcn3950 Firmware, Qualcomm Qualcomm Video Collaboration Vc1 Platform Firmware, Qualcomm Sa6145P Firmware, Qualcomm Sa8195P Firmware, Qualcomm Snapdragon 845 Mobile Platform Firmware, Qualcomm Qca6564 Firmware, Qualcomm Snapdragon 720G Mobile Platform Firmware, Qualcomm Sxr2130 Firmware, Qualcomm Qcs4290 Firmware, Qualcomm Smart Display 200 Platform Firmware, Qualcomm Sd660 Firmware, Qualcomm Wcd9335 Firmware, Qualcomm Wsa8810 Firmware, Qualcomm Sd 675 Firmware, Qualcomm Qcm4290 Firmware, Qualcomm Qcs410 Firmware, Qualcomm Qfw7114 Firmware, Qualcomm Apq8017 Firmware, Qualcomm Snapdragon 730 Mobile Platform Firmware, Qualcomm Snapdragon 675 Mobile Platform Firmware, Qualcomm Sa8145P Firmware, Qualcomm Wsa8815 Firmware, Qualcomm Sd888 Firmware, Qualcomm Ar8031 Firmware, Qualcomm Sd855 Firmware, Qualcomm Snapdragon Xr1 Platform Firmware, Qualcomm Qcm2290 Firmware, Qualcomm Snapdragon 212 Mobile Platform Firmware, Qualcomm Fastconnect 6700 Firmware, Qualcomm Snapdragon 210 Processor Firmware, Qualcomm Snapdragon Xr2 5G Platform Firmware, Qualcomm Qca6696 Firmware, Qualcomm Csra6620 Firmware, Qualcomm Qca6391 Firmware, Qualcomm Qca8081 Firmware, Qualcomm Snapdragon 695 5G Mobile Platform Firmware, Qualcomm Snapdragon 7C\+ Gen 3 Compute Firmware, Qualcomm Wsa8835 Firmware, Qualcomm Snapdragon 835 Mobile Pc Platform Firmware, Qualcomm Qualcomm Video Collaboration Vc5 Platform Firmware, Qualcomm Qualcomm 215 Mobile Platform Firmware, Qualcomm Qca6310 Firmware, Qualcomm Wcn3980 Firmware, Qualcomm Qam8650P Firmware, Qualcomm Msm8909W Firmware, Qualcomm Flight Rb5 5G Platform Firmware, Qualcomm Qca6421 Firmware, Qualcomm Sa6155 Firmware, Qualcomm Snapdragon 8 Gen 2 Mobile Platform Firmware, Qualcomm Snapdragon 660 Mobile Platform Firmware, Qualcomm Wcn3990 Firmware, Qualcomm Snapdragon Wear 2500 Platform Firmware, Qualcomm Mdm9330 Firmware, Qualcomm Wcn3620 Firmware, Qualcomm Qualcomm 205 Mobile Platform Firmware, Qualcomm Wcn3910 Firmware, Qualcomm Sg8275P Firmware, Qualcomm Snapdragon Wear 3100 Platform Firmware, Qualcomm Msm8608 Firmware, Qualcomm Qca6335 Firmware, Qualcomm Wsa8840 Firmware, Qualcomm Snapdragon 480\+ 5G Mobile Platform Firmware, Qualcomm Qcc710 Firmware, Qualcomm Snapdragon 480 5G Mobile Platform Firmware, Qualcomm Sm7315 Firmware, Qualcomm Qcs7230 Firmware, Qualcomm Snapdragon X12 Lte Modem Firmware, Qualcomm Sw5100P Firmware, Qualcomm Qfw7124 Firmware, Qualcomm Vision Intelligence 100 Platform Firmware, Qualcomm Sa8255P Firmware, Qualcomm Sm6250 Firmware, Qualcomm Sdm429W Firmware, Qualcomm 315 5G Iot Modem Firmware, Qualcomm Wcd9371 Firmware, Qualcomm Qcn6224 Firmware, Qualcomm Snapdragon 1200 Wearable Platform Firmware, Qualcomm Sa4155P Firmware, Qualcomm Snapdragon X55 5G Modem-Rf System Firmware, Qualcomm Qca6430 Firmware, Qualcomm Fastconnect 6200 Firmware, Qualcomm Wcn3680B Firmware, Qualcomm Sd675 Firmware, Qualcomm Wsa8845 Firmware, Qualcomm 9206 Lte Modem Firmware, Qualcomm Qca9377 Firmware, Qualcomm Snapdragon 429 Mobile Platform Firmware, Qualcomm Snapdragon 765G 5G Mobile Platform Firmware, Qualcomm Fastconnect 6800 Firmware, Qualcomm Sdx55 Firmware, Qualcomm Snapdragon 710 Mobile Platform Firmware, Qualcomm Qca8337 Firmware, Qualcomm Wcn6740 Firmware, Qualcomm Snapdragon 870 5G Mobile Platform Firmware, Qualcomm Qam8255P Firmware, Qualcomm Qca6431 Firmware, Qualcomm Apq8064Au Firmware, Qualcomm Snapdragon 685 4G Mobile Platform Firmware, Qualcomm Snapdragon 778G 5G Mobile Platform Firmware, Qualcomm Qcm4325 Firmware, Qualcomm Sa6155P Firmware, Qualcomm Snapdragon 690 5G Mobile Platform Firmware, Qualcomm Snapdragon 750G 5G Mobile Platform Firmware, Qualcomm Wcd9395 Firmware, Qualcomm Mdm9628 Firmware, Qualcomm Sm7325P Firmware, Qualcomm Csra6640 Firmware, Qualcomm Wcn3680 Firmware, Qualcomm Snapdragon 730G Mobile Platform Firmware, Qualcomm Msm8209 Firmware, Qualcomm Sg4150P Firmware, Qualcomm Snapdragon X50 5G Modem-Rf System Firmware, Qualcomm Wsa8830 Firmware, Qualcomm Msm8108 Firmware, Qualcomm Qrb5165M Firmware, Qualcomm Snapdragon 888\+ 5G Mobile Platform Firmware, Qualcomm Snapdragon X20 Lte Modem Firmware, Qualcomm Wcd9341 Firmware, Qualcomm Sa8155P Firmware, Qualcomm Snapdragon X75 5G Modem-Rf System Firmware, Qualcomm Qca6595 Firmware, Qualcomm Sa4150P Firmware, Qualcomm Sa8150P Firmware, Qualcomm Snapdragon 208 Processor Firmware, Qualcomm Fastconnect 6900 Firmware, Qualcomm Qca6426 Firmware, Qualcomm Qca6564Au Firmware, Qualcomm Fastconnect 7800 Firmware, Qualcomm Snapdragon 670 Mobile Platform Firmware, Qualcomm Vision Intelligence 400 Platform Firmware, Qualcomm Wcd9340 Firmware, Qualcomm Vision Intelligence 200 Platform Firmware, Qualcomm Snapdragon 778G\+ 5G Mobile Platform Firmware, Qualcomm Qca6584Au Firmware, Qualcomm Wcd9326 Firmware, Qualcomm Snapdragon Auto 5G Modem-Rf Firmware, Qualcomm Qca6595Au Firmware, Qualcomm Qcn9011 Firmware, Qualcomm Qcm8550 Firmware, Qualcomm Snapdragon 678 Mobile Platform Firmware, Qualcomm Sxr1120 Firmware, Qualcomm Snapdragon 732G Mobile Platform Firmware, Qualcomm Qcs6490 Firmware, Qualcomm Sw5100 Firmware, Qualcomm Qca6584 Firmware" CVE-2023-43511,Transient DOS while parsing IPv6 extension header when WLAN firmware receives an IPv6 packet that contains `IPPROTO_NONE` as the next header.,7.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,"Qualcomm Snapdragon 8Cx Gen 3 Compute Platform Firmware, Qualcomm Ipq6010 Firmware, Qualcomm Wcn3999 Firmware, Qualcomm Snapdragon 636 Mobile Platform Firmware, Qualcomm Qcs8250 Firmware, Qualcomm Qcn5052 Firmware, Qualcomm Ipq8074A Firmware, Qualcomm Qcm6490 Firmware, Qualcomm Qca6574A Firmware, Qualcomm Qca1990 Firmware, Qualcomm Qca9367 Firmware, Qualcomm Snapdragon 765 5G Mobile Platform Firmware, Qualcomm Qca4024 Firmware, Qualcomm Qcs2290 Firmware, Qualcomm Wcd9360 Firmware, Qualcomm Qam8775P Firmware, Qualcomm Ipq9574 Firmware, Qualcomm Snapdragon 780G 5G Mobile Platform Firmware, Qualcomm Qca6420 Firmware, Qualcomm Qca6574 Firmware, Qualcomm Qca9379 Firmware, Qualcomm Aqt1000 Firmware, Qualcomm Qca8084 Firmware, Qualcomm Qsm8350 Firmware, Qualcomm Wcd9380 Firmware, Qualcomm Snapdragon 865\+ 5G Mobile Platform Firmware, Qualcomm Qca6436 Firmware, Qualcomm Qca6174 Firmware, Qualcomm Qcn5152 Firmware, Qualcomm Csr8811 Firmware, Qualcomm Qcn6100 Firmware, Qualcomm Qcs410 Firmware, Qualcomm Wsa8815 Firmware, Qualcomm Sd888 Firmware, Qualcomm Ar8031 Firmware, Qualcomm Sc8180X\+Sdx55 Firmware, Qualcomm Qcm2290 Firmware, Qualcomm Qca6696 Firmware, Qualcomm Ipq8076 Firmware, Qualcomm Snapdragon 695 5G Mobile Platform Firmware, Qualcomm Qca9985 Firmware, Qualcomm Qualcomm Video Collaboration Vc5 Platform Firmware, Qualcomm Wcn3980 Firmware, Qualcomm Ipq8069 Firmware, Qualcomm Qam8650P Firmware, Qualcomm Qcn5021 Firmware, Qualcomm Sd 8Cx Firmware, Qualcomm Qcc2076 Firmware, Qualcomm Snapdragon Ar2 Gen 1 Platform Firmware, Qualcomm Ipq5010 Firmware, Qualcomm Qca8075 Firmware, Qualcomm Wcn3990 Firmware, Qualcomm Qcn6024 Firmware, Qualcomm Qcn9013 Firmware, Qualcomm Qca9986 Firmware, Qualcomm Sw5100P Firmware, Qualcomm Qfw7124 Firmware, Qualcomm Ipq9570 Firmware, Qualcomm Qcn9003 Firmware, Qualcomm 315 5G Iot Modem Firmware, Qualcomm Snapdragon 1200 Wearable Platform Firmware, Qualcomm Qcn6102 Firmware, Qualcomm Sd460 Firmware, Qualcomm Snapdragon 765G 5G Mobile Platform Firmware, Qualcomm Sdx55 Firmware, Qualcomm Ipq8071A Firmware, Qualcomm Qcn5022 Firmware, Qualcomm Snapdragon 870 5G Mobile Platform Firmware, Qualcomm Qca6431 Firmware, Qualcomm Qcn9001 Firmware, Qualcomm Qcm4325 Firmware, Qualcomm Snapdragon 690 5G Mobile Platform Firmware, Qualcomm Snapdragon 750G 5G Mobile Platform Firmware, Qualcomm Mdm9628 Firmware, Qualcomm Sm7325P Firmware, Qualcomm Snapdragon X20 Lte Modem Firmware, Qualcomm Vision Intelligence 300 Platform Firmware, Qualcomm Sa8155P Firmware, Qualcomm Sd662 Firmware, Qualcomm Sa4150P Firmware, Qualcomm Immersive Home 318 Platform Firmware, Qualcomm Qca6564Au Firmware, Qualcomm Fastconnect 7800 Firmware, Qualcomm Snapdragon X65 5G Modem-Rf System Firmware, Qualcomm Qcn9011 Firmware, Qualcomm Snapdragon 678 Mobile Platform Firmware, Qualcomm Snapdragon 732G Mobile Platform Firmware, Qualcomm Wcn6740 Firmware, Qualcomm Qcn9070 Firmware, Qualcomm Ar9380 Firmware, Qualcomm Sd821 Firmware, Qualcomm Mdm9640 Firmware, Qualcomm Qcn7605 Firmware, Qualcomm Wcd9390 Firmware, Qualcomm Qrb5165N Firmware, Qualcomm Snapdragon 630 Mobile Platform Firmware, Qualcomm Sa6150P Firmware, Qualcomm Qca6320 Firmware, Qualcomm Qca9886 Firmware, Qualcomm Ipq9554 Firmware, Qualcomm Smart Audio 200 Platform Firmware, Qualcomm Wcd9330 Firmware, Qualcomm Ipq8174 Firmware, Qualcomm Qcs610 Firmware, Qualcomm Qca6574Au Firmware, Qualcomm Qca1064 Firmware, Qualcomm Sd 8 Gen1 5G Firmware, Qualcomm Snapdragon 820 Automotive Platform Firmware, Qualcomm Qca2065 Firmware, Qualcomm Qcn9002 Firmware, Qualcomm Snapdragon 768G 5G Mobile Platform Firmware, Qualcomm Qca2064 Firmware, Qualcomm Qca8386 Firmware, Qualcomm Ipq8078 Firmware, Qualcomm Snapdragon 662 Mobile Platform Firmware, Qualcomm Wcd9385 Firmware, Qualcomm Snapdragon 855 Mobile Platform Firmware, Qualcomm Snapdragon 680 4G Mobile Platform Firmware, Qualcomm Qca9980 Firmware, Qualcomm Sxr1230P Firmware, Qualcomm Sa8155 Firmware, Qualcomm Snapdragon 8\+ Gen 2 Mobile Platform Firmware, Qualcomm Ar8035 Firmware, Qualcomm Csrb31024 Firmware, Qualcomm Qcn6274 Firmware, Qualcomm Ipq5332 Firmware, Qualcomm Snapdragon 845 Mobile Platform Firmware, Qualcomm Snapdragon 720G Mobile Platform Firmware, Qualcomm Sxr2130 Firmware, Qualcomm Qcs4290 Firmware, Qualcomm Snapdragon 821 Mobile Platform Firmware, Qualcomm Snapdragon 850 Mobile Compute Platform Firmware, Qualcomm Ipq4029 Firmware, Qualcomm Apq8017 Firmware, Qualcomm Snapdragon 675 Mobile Platform Firmware, Qualcomm Sm6250P Firmware, Qualcomm Sd855 Firmware, Qualcomm Snapdragon Xr2 5G Platform Firmware, Qualcomm Qca6391 Firmware, Qualcomm Wsa8835 Firmware, Qualcomm Qca6310 Firmware, Qualcomm Qcn5164 Firmware, Qualcomm Immersive Home 216 Platform Firmware, Qualcomm Qcm4490 Firmware, Qualcomm Ipq8173 Firmware, Qualcomm Snapdragon 8 Gen 2 Mobile Platform Firmware, Qualcomm Qca6428 Firmware, Qualcomm Snapdragon 8 Gen 1 Mobile Platform Firmware, Qualcomm Wcn3910 Firmware, Qualcomm Sg8275P Firmware, Qualcomm Qca6335 Firmware, Qualcomm Wsa8840 Firmware, Qualcomm Qcn5024 Firmware, Qualcomm Immersive Home 326 Platform Firmware, Qualcomm Sa8255P Firmware, Qualcomm Qca2066 Firmware, Qualcomm Qca9990 Firmware, Qualcomm Snapdragon X55 5G Modem-Rf System Firmware, Qualcomm Fastconnect 6200 Firmware, Qualcomm Wsa8845 Firmware, Qualcomm Qca9377 Firmware, Qualcomm Qcn9072 Firmware, Qualcomm Snapdragon 710 Mobile Platform Firmware, Qualcomm Qam8255P Firmware, Qualcomm Snapdragon 778G 5G Mobile Platform Firmware, Qualcomm Sg4150P Firmware, Qualcomm Wcd9341 Firmware, Qualcomm Qrb5165M Firmware, Qualcomm Qca4531 Firmware, Qualcomm Fastconnect 6900 Firmware, Qualcomm Ipq8064 Firmware, Qualcomm Vision Intelligence 400 Platform Firmware, Qualcomm Qca9994 Firmware, Qualcomm Snapdragon 778G\+ 5G Mobile Platform Firmware, Qualcomm Snapdragon Auto 5G Modem-Rf Firmware, Qualcomm Qcn9000 Firmware, Qualcomm Apq8094 Firmware, Qualcomm Qcn6132 Firmware, Qualcomm Qcn7606 Firmware, Qualcomm Msm8996Au Firmware, Qualcomm Qca6174A Firmware, Qualcomm Wcd9375 Firmware, Qualcomm Qualcomm Video Collaboration Vc3 Platform Firmware, Qualcomm Qcn9074 Firmware, Qualcomm Qcs8550 Firmware, Qualcomm Snapdragon 888 5G Mobile Platform Firmware, Qualcomm Qsm8250 Firmware, Qualcomm Qca6797Aq Firmware, Qualcomm Snapdragon 855\+\/860 Mobile Platform Firmware, Qualcomm Wsa8832 Firmware, Qualcomm Qam8295P Firmware, Qualcomm Qcn9274 Firmware, Qualcomm Snapdragon X24 Lte Modem Firmware, Qualcomm Wcd9370 Firmware, Qualcomm Wsa8845H Firmware, Qualcomm Sd670 Firmware, Qualcomm Wcn3610 Firmware, Qualcomm Ipq4018 Firmware, Qualcomm Qcs4490 Firmware, Qualcomm Qca9898 Firmware, Qualcomm Sm7250P Firmware, Qualcomm Mdm9650 Firmware, Qualcomm Mdm9250 Firmware, Qualcomm Sd730 Firmware, Qualcomm Qcn6122 Firmware, Qualcomm Qcn5124 Firmware, Qualcomm Snapdragon 665 Mobile Platform Firmware, Qualcomm Sm4125 Firmware, Qualcomm Qca6175A Firmware, Qualcomm Robotics Rb3 Platform Firmware, Qualcomm Sd820 Firmware, Qualcomm Snapdragon 460 Mobile Platform Firmware, Qualcomm Ipq8070 Firmware, Qualcomm Ipq8072A Firmware, Qualcomm Ipq8065 Firmware, Qualcomm Pmp8074 Firmware, Qualcomm Smart Audio 400 Platform Firmware, Qualcomm Qcn6023 Firmware, Qualcomm Snapdragon 8Cx Compute Platform Firmware, Qualcomm Sa8295P Firmware, Qualcomm Snapdragon 808 Processor Firmware, Qualcomm Qca6564A Firmware, Qualcomm Wcn3950 Firmware, Qualcomm Sa6145P Firmware, Qualcomm Immersive Home 316 Platform Firmware, Qualcomm Wcd9335 Firmware, Qualcomm Wsa8810 Firmware, Qualcomm Sd660 Firmware, Qualcomm Sd 675 Firmware, Qualcomm Sdx65M Firmware, Qualcomm Qfw7114 Firmware, Qualcomm Qca2062 Firmware, Qualcomm Sa8145P Firmware, Qualcomm Snapdragon 820 Mobile Platform Firmware, Qualcomm Ipq8070A Firmware, Qualcomm Fastconnect 6700 Firmware, Qualcomm Snapdragon 7C\+ Gen 3 Compute Firmware, Qualcomm Snapdragon 835 Mobile Pc Platform Firmware, Qualcomm Snapdragon 8\+ Gen 1 Mobile Platform Firmware, Qualcomm Flight Rb5 5G Platform Firmware, Qualcomm Sd 455 Firmware, Qualcomm Qca6421 Firmware, Qualcomm Sa6155 Firmware, Qualcomm Ipq6028 Firmware, Qualcomm Qcc710 Firmware, Qualcomm Qcn9100 Firmware, Qualcomm Sm7315 Firmware, Qualcomm Qca9992 Firmware, Qualcomm Sm6250 Firmware, Qualcomm Qcn6224 Firmware, Qualcomm Fastconnect 6800 Firmware, Qualcomm Qcn6112 Firmware, Qualcomm Qca8085 Firmware, Qualcomm Sxr2230P Firmware, Qualcomm Apq8064Au Firmware, Qualcomm Snapdragon 685 4G Mobile Platform Firmware, Qualcomm Wcd9395 Firmware, Qualcomm Qca9889 Firmware, Qualcomm Qca6584 Firmware, Qualcomm Csra6640 Firmware, Qualcomm Qcn9022 Firmware, Qualcomm Snapdragon X75 5G Modem-Rf System Firmware, Qualcomm Qca6595 Firmware, Qualcomm Sa8150P Firmware, Qualcomm Ipq8076A Firmware, Qualcomm Qca6426 Firmware, Qualcomm Snapdragon 7C Compute Platform Firmware, Qualcomm Wcd9340 Firmware, Qualcomm Qca6584Au Firmware, Qualcomm Qca6595Au Firmware, Qualcomm Qcm8550 Firmware, Qualcomm Wcn3988 Firmware, Qualcomm Sd865 5G Firmware, Qualcomm Qcs6125 Firmware, Qualcomm Qca6438 Firmware, Qualcomm Snapdragon 4 Gen 2 Mobile Platform Firmware, Qualcomm Ipq9008 Firmware, Qualcomm Wcn3615 Firmware, Qualcomm Snapdragon 865 5G Mobile Platform Firmware, Qualcomm Snapdragon X5 Lte Modem Firmware, Qualcomm Wcn3660B Firmware, Qualcomm Qcm6125 Firmware, Qualcomm Qca9888 Firmware, Qualcomm Snapdragon 4 Gen 1 Mobile Platform Firmware, Qualcomm Qca0000 Firmware, Qualcomm Apq8092 Firmware, Qualcomm Snapdragon 7C Gen 2 Compute Platform Firmware, Qualcomm Qca1023 Firmware, Qualcomm Snapdragon Xr2\+ Gen 1 Platform Firmware, Qualcomm Sdx20M Firmware, Qualcomm Snapdragon 8Cx Gen 2 5G Compute Platform Firmware, Qualcomm Qcn9024 Firmware, Qualcomm Immersive Home 214 Platform Firmware, Qualcomm Qcn5122 Firmware, Qualcomm Snapdragon 782G Mobile Platform Firmware, Qualcomm Sm8550P Firmware, Qualcomm Snapdragon W5\+ Gen 1 Wearable Platform Firmware, Qualcomm Qca6698Aq Firmware, Qualcomm Robotics Rb5 Platform Firmware, Qualcomm Snapdragon Auto 4G Modem Firmware, Qualcomm Sd835 Firmware, Qualcomm Qcn9012 Firmware, Qualcomm Qualcomm Video Collaboration Vc1 Platform Firmware, Qualcomm Sa8195P Firmware, Qualcomm Qca6564 Firmware, Qualcomm Qca6678Aq Firmware, Qualcomm Ipq6018 Firmware, Qualcomm Qcm4290 Firmware, Qualcomm Snapdragon 730 Mobile Platform Firmware, Qualcomm Qcn5154 Firmware, Qualcomm Ipq8074 Firmware, Qualcomm Qca1062 Firmware, Qualcomm Snapdragon Xr1 Platform Firmware, Qualcomm Csra6620 Firmware, Qualcomm Qca8081 Firmware, Qualcomm Mdm9645 Firmware, Qualcomm Qca6554A Firmware, Qualcomm Ssg2115P Firmware, Qualcomm Qca8082 Firmware, Qualcomm Qca9984 Firmware, Qualcomm Ipq8068 Firmware, Qualcomm Qcf8001 Firmware, Qualcomm Qca8072 Firmware, Qualcomm Ipq4028 Firmware, Qualcomm Snapdragon 660 Mobile Platform Firmware, Qualcomm Qcc2073 Firmware, Qualcomm Snapdragon 8C Compute Platform Firmware, Qualcomm Ipq6000 Firmware, Qualcomm Ipq8078A Firmware, Qualcomm Snapdragon 480\+ 5G Mobile Platform Firmware, Qualcomm Snapdragon 480 5G Mobile Platform Firmware, Qualcomm Qcs7230 Firmware, Qualcomm Snapdragon X12 Lte Modem Firmware, Qualcomm Ssg2125P Firmware, Qualcomm Qcn5054 Firmware, Qualcomm Wcd9371 Firmware, Qualcomm Sa4155P Firmware, Qualcomm Qca6430 Firmware, Qualcomm Home Hub 100 Platform Firmware, Qualcomm Sd675 Firmware, Qualcomm Snapdragon 712 Mobile Platform Firmware, Qualcomm 9206 Lte Modem Firmware, Qualcomm Qca8337 Firmware, Qualcomm Immersive Home 3210 Platform Firmware, Qualcomm Sa6155P Firmware, Qualcomm Snapdragon 730G Mobile Platform Firmware, Qualcomm Snapdragon X50 5G Modem-Rf System Firmware, Qualcomm Wsa8830 Firmware, Qualcomm Snapdragon 888\+ 5G Mobile Platform Firmware, Qualcomm Ipq5028 Firmware, Qualcomm Snapdragon 670 Mobile Platform Firmware, Qualcomm Wcd9326 Firmware, Qualcomm Sxr1120 Firmware, Qualcomm Qcs6490 Firmware, Qualcomm Sw5100 Firmware, Qualcomm Snapdragon 810 Processor Firmware" CVE-2023-43512,Transient DOS while parsing GATT service data when the total amount of memory that is required by the multiple services is greater than the actual size of the services buffer.,7.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,Qualcomm Qcn7606 Firmware CVE-2023-43514,Memory corruption while invoking IOCTLs calls from user space for internal mem MAP and internal mem UNMAP.,8.4,CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,"Qualcomm Wcn3988 Firmware, Qualcomm Wcd9375 Firmware, Qualcomm Wcd9390 Firmware, Qualcomm Qrb5165N Firmware, Qualcomm Qualcomm Video Collaboration Vc3 Platform Firmware, Qualcomm Qcs8550 Firmware, Qualcomm Qca6797Aq Firmware, Qualcomm Qam8295P Firmware, Qualcomm Qcs8250 Firmware, Qualcomm Wcd9370 Firmware, Qualcomm Wsa8845H Firmware, Qualcomm Qdx1011 Firmware, Qualcomm Qcm6490 Firmware, Qualcomm Qca6574A Firmware, Qualcomm Qca6574Au Firmware, Qualcomm Qdu1110 Firmware, Qualcomm Qam8775P Firmware, Qualcomm Snapdragon 4 Gen 1 Mobile Platform Firmware, Qualcomm Qca6574 Firmware, Qualcomm Wcd9385 Firmware, Qualcomm Snapdragon 680 4G Mobile Platform Firmware, Qualcomm Wcd9380 Firmware, Qualcomm Sm8550P Firmware, Qualcomm Snapdragon W5\+ Gen 1 Wearable Platform Firmware, Qualcomm Snapdragon 8\+ Gen 2 Mobile Platform Firmware, Qualcomm Sa8295P Firmware, Qualcomm Qca6698Aq Firmware, Qualcomm Ar8035 Firmware, Qualcomm Qcn6274 Firmware, Qualcomm Robotics Rb5 Platform Firmware, Qualcomm Wcn3950 Firmware, Qualcomm Sa8195P Firmware, Qualcomm Wsa8810 Firmware, Qualcomm Qfw7114 Firmware, Qualcomm Wsa8815 Firmware, Qualcomm Qru1052 Firmware, Qualcomm Fastconnect 6700 Firmware, Qualcomm Qdu1210 Firmware, Qualcomm Qca6696 Firmware, Qualcomm Qca6391 Firmware, Qualcomm Qca8081 Firmware, Qualcomm Snapdragon 695 5G Mobile Platform Firmware, Qualcomm Wsa8835 Firmware, Qualcomm Qualcomm Video Collaboration Vc5 Platform Firmware, Qualcomm Wcn3980 Firmware, Qualcomm Qam8650P Firmware, Qualcomm Flight Rb5 5G Platform Firmware, Qualcomm Snapdragon 8 Gen 2 Mobile Platform Firmware, Qualcomm Sg8275P Firmware, Qualcomm Qdu1000 Firmware, Qualcomm Qru1062 Firmware, Qualcomm Wsa8840 Firmware, Qualcomm Snapdragon 480\+ 5G Mobile Platform Firmware, Qualcomm Qcc710 Firmware, Qualcomm Snapdragon 480 5G Mobile Platform Firmware, Qualcomm Qru1032 Firmware, Qualcomm Qcs7230 Firmware, Qualcomm Sw5100P Firmware, Qualcomm Qfw7124 Firmware, Qualcomm Sa8255P Firmware, Qualcomm Qdx1010 Firmware, Qualcomm Qcn6224 Firmware, Qualcomm Fastconnect 6200 Firmware, Qualcomm Wsa8845 Firmware, Qualcomm Qca8337 Firmware, Qualcomm Qam8255P Firmware, Qualcomm Snapdragon 685 4G Mobile Platform Firmware, Qualcomm Qdu1010 Firmware, Qualcomm Qcm4325 Firmware, Qualcomm Sa6155P Firmware, Qualcomm Wcd9395 Firmware, Qualcomm Sg4150P Firmware, Qualcomm Wsa8830 Firmware, Qualcomm Sa8155P Firmware, Qualcomm Snapdragon X75 5G Modem-Rf System Firmware, Qualcomm Qca6595 Firmware, Qualcomm Fastconnect 6900 Firmware, Qualcomm Fastconnect 7800 Firmware, Qualcomm Wcd9340 Firmware, Qualcomm Qca6595Au Firmware, Qualcomm Qcm8550 Firmware, Qualcomm Qcs6490 Firmware, Qualcomm Sw5100 Firmware" CVE-2023-47039,"A vulnerability was found in Perl. This security issue occurs while Perl for Windows relies on the system path environment variable to find the shell (`cmd.exe`). When running an executable that uses the Windows Perl interpreter, Perl attempts to find and execute `cmd.exe` within the operating system. However, due to path search order issues, Perl initially looks for cmd.exe in the current working directory. This flaw allows an attacker with limited privileges to place`cmd.exe` in locations with weak permissions, such as `C:\ProgramData`. By doing so, arbitrary code can be executed when an administrator attempts to use this executable from these compromised locations.",7.8,CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,Microsoft Windows CVE-2023-47216," in OpenHarmony v3.2.2 and prior versions allow a local attacker cause DOS through occupy all resources ",2.9,CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L,Openatom Openharmony CVE-2023-47857," in OpenHarmony v3.2.2 and prior versions allow a local attacker cause multimedia camera crash through modify a released pointer.",4.0,CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L,Openatom Openharmony CVE-2023-48360," in OpenHarmony v3.2.2 and prior versions allow a local attacker cause multimedia player crash through modify a released pointer.",4.0,CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L,Openatom Openharmony CVE-2023-49135," in OpenHarmony v3.2.2 and prior versions allow a local attacker cause multimedia player crash through modify a released pointer.",4.0,CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L,Openatom Openharmony CVE-2023-49142," in OpenHarmony v3.2.2 and prior versions allow a local attacker cause multimedia audio crash through modify a released pointer.",4.0,CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L,Openatom Openharmony CVE-2023-47858,"Mattermost fails to properly verify the permissions needed for viewing archived public channels,  allowing a member of one team to get details about the archived public channels of another team via the GET /api/v4/teams//channels/deleted endpoint. ",4.3,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N,N/A CVE-2023-48732,"Mattermost fails to scope the WebSocket response around notified users to a each user separately resulting in the WebSocket broadcasting the information about who was notified about a post to everyone else in the channel. ",4.3,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N,N/A CVE-2023-50333,"Mattermost fails to update the permissions of the current session for a user who was just demoted to guest, allowing freshly demoted guests to change group names. ",3.7,CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:L,N/A CVE-2023-6693,"A stack based buffer overflow was found in the virtio-net device of QEMU. This issue occurs when flushing TX in the virtio_net_flush_tx function if guest features VIRTIO_NET_F_HASH_REPORT, VIRTIO_F_VERSION_1 and VIRTIO_NET_F_MRG_RXBUF are enabled. This could allow a malicious user to overwrite local variables allocated on the stack. Specifically, the `out_sg` variable could be used to read a part of process memory and send it to the wire, causing an information leak.",4.9,CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L,"Fedoraproject Fedora 39, Redhat Enterprise Linux 9.0, Redhat Enterprise Linux 8.0" CVE-2023-6436,"Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Ekol Informatics Website Template allows SQL Injection.This issue affects Website Template: through 20231215. ",9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,N/A CVE-2015-10128,A vulnerability was found in rt-prettyphoto Plugin up to 1.2 on WordPress and classified as problematic. Affected by this issue is the function royal_prettyphoto_plugin_links of the file rt-prettyphoto.php. The manipulation leads to cross site scripting. The attack may be launched remotely. Upgrading to version 1.3 is able to address this issue. The patch is identified as 0d3d38cfa487481b66869e4212df1cefc281ecb7. It is recommended to upgrade the affected component. VDB-249422 is the identifier assigned to this vulnerability.,3.5,CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N,N/A CVE-2017-20188,A vulnerability has been found in Zimbra zm-ajax up to 8.8.1 and classified as problematic. Affected by this vulnerability is the function XFormItem.prototype.setError of the file WebRoot/js/ajax/dwt/xforms/XFormItem.js. The manipulation of the argument message leads to cross site scripting. The attack can be launched remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. Upgrading to version 8.8.2 is able to address this issue. The identifier of the patch is 8d039d6efe80780adc40c6f670c06d21de272105. It is recommended to upgrade the affected component. The identifier VDB-249421 was assigned to this vulnerability.,2.6,CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:N,N/A CVE-2024-0188,"A vulnerability, which was classified as problematic, was found in RRJ Nueva Ecija Engineer Online Portal 1.0. This affects an unknown part of the file change_password_teacher.php. The manipulation leads to weak password requirements. It is possible to initiate the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. The identifier VDB-249501 was assigned to this vulnerability.",3.1,CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N,N/A CVE-2018-25097,"A vulnerability, which was classified as problematic, was found in Acumos Design Studio up to 2.0.7. Affected is an unknown function. The manipulation leads to cross site scripting. It is possible to launch the attack remotely. Upgrading to version 2.0.8 is able to address this issue. The name of the patch is 0df8a5e8722188744973168648e4c74c69ce67fd. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-249420.",3.5,CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N,N/A CVE-2023-4280,An unvalidated input in Silicon Labs TrustZone implementation in v4.3.x and earlier of the Gecko SDK allows an attacker to access the trusted region of memory from the untrusted region.,9.3,CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H,N/A CVE-2024-0189,A vulnerability has been found in RRJ Nueva Ecija Engineer Online Portal 1.0 and classified as problematic. This vulnerability affects unknown code of the file teacher_message.php of the component Create Message Handler. The manipulation of the argument Content with the input leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-249502 is the identifier assigned to this vulnerability.,3.5,CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N,N/A CVE-2024-0193,"A use-after-free flaw was found in the netfilter subsystem of the Linux kernel. If the catchall element is garbage-collected when the pipapo set is removed, the element can be deactivated twice. This can cause a use-after-free issue on an NFT_CHAIN object or NFT_OBJECT object, allowing a local unprivileged user with CAP_NET_ADMIN capability to escalate their privileges on the system.",7.8,CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,"Redhat Enterprise Linux 9.0, Linux Linux Kernel" CVE-2022-3010,"The Priva TopControl Suite contains predictable credentials for the SSH service, based on the Serial number. Which makes it possible for an attacker to calculate the login credentials for the Priva TopControll suite.",7.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,N/A CVE-2023-48419,"An attacker in the wifi vicinity of a target Google Home can spy on the victim, resulting in Elevation of Privilege  ",10.0,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H,"Google Home Mini Firmware, Google Nest Mini Firmware, Google Nest Audio Firmware, Google Home Firmware" CVE-2023-7192,A memory leak problem was found in ctnetlink_create_conntrack in net/netfilter/nf_conntrack_netlink.c in the Linux Kernel. This issue may allow a local attacker with CAP_NET_ADMIN privileges to cause a denial of service (DoS) attack due to a refcount overflow.,5.5,CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H,"Redhat Enterprise Linux 9.0, Redhat Enterprise Linux 8.0, Linux Linux Kernel" CVE-2024-0190,A vulnerability was found in RRJ Nueva Ecija Engineer Online Portal 1.0 and classified as problematic. This issue affects some unknown processing of the file add_quiz.php of the component Quiz Handler. The manipulation of the argument Quiz Title/Quiz Description with the input leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-249503.,3.5,CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N,N/A CVE-2023-49794,"KernelSU is a Kernel-based root solution for Android devices. In versions 0.7.1 and prior, the logic of get apk path in KernelSU kernel module can be bypassed, which causes any malicious apk named `me.weishu.kernelsu` get root permission. If a KernelSU module installed device try to install any not checked apk which package name equal to the official KernelSU Manager, it can take over root privileges on the device. As of time of publication, a patched version is not available.",6.7,CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H,N/A CVE-2023-50711,"vmm-sys-util is a collection of modules that provides helpers and utilities used by multiple rust-vmm components. Starting in version 0.5.0 and prior to version 0.12.0, an issue in the `FamStructWrapper::deserialize` implementation provided by the crate for `vmm_sys_util::fam::FamStructWrapper` can lead to out of bounds memory accesses. The deserialization does not check that the length stored in the header matches the flexible array length. Mismatch in the lengths might allow out of bounds memory access through Rust-safe methods. The issue was corrected in version 0.12.0 by inserting a check that verifies the lengths of compared flexible arrays are equal for any deserialized header and aborting deserialization otherwise. Moreover, the API was changed so that header length can only be modified through Rust-unsafe code. This ensures that users cannot trigger out-of-bounds memory access from Rust-safe code.",5.7,CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:L,N/A CVE-2023-51652,"OWASP AntiSamy .NET is a library for performing cleansing of HTML coming from untrusted sources. Prior to version 1.2.0, there is a potential for a mutation cross-site scripting (mXSS) vulnerability in AntiSamy caused by flawed parsing of the HTML being sanitized. To be subject to this vulnerability the `preserveComments` directive must be enabled in your policy file and also allow for certain tags at the same time. As a result, certain crafty inputs can result in elements in comment tags being interpreted as executable when using AntiSamy's sanitized output. This is patched in OWASP AntiSamy .NET 1.2.0 and later. See important remediation details in the reference given below. As a workaround, manually edit the AntiSamy policy file (e.g., antisamy.xml) by deleting the `preserveComments` directive or setting its value to `false`, if present. Also it would be useful to make AntiSamy remove the `noscript` tag by adding a line described in the GitHub Security Advisory to the tag definitions under the `` node, or deleting it entirely if present. As the previously mentioned policy settings are preconditions for the mXSS attack to work, changing them as recommended should be sufficient to protect you against this vulnerability when using a vulnerable version of this library. However, the existing bug would still be present in AntiSamy or its parser dependency (HtmlAgilityPack). The safety of this workaround relies on configurations that may change in the future and don't address the root cause of the vulnerability. As such, it is strongly recommended to upgrade to a fixed version of AntiSamy.",6.1,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N,N/A CVE-2024-0191,A vulnerability was found in RRJ Nueva Ecija Engineer Online Portal 1.0. It has been classified as problematic. Affected is an unknown function of the file /admin/uploads/. The manipulation leads to file and directory information exposure. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-249504.,5.3,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N,N/A CVE-2024-0192,A vulnerability was found in RRJ Nueva Ecija Engineer Online Portal 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file downloadable.php of the component Add Downloadable. The manipulation leads to unrestricted upload. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-249505 was assigned to this vulnerability.,6.3,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L,N/A CVE-2023-45561,An issue in A-WORLD OIRASE BEER_waiting Line v.13.6.1 allows attackers to send crafted notifications via leakage of the channel access token.,5.3,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N,N/A CVE-2023-45892,An issue discovered in the Order and Invoice pages in Floorsight Insights Q3 2023 allows an unauthenticated remote attacker to view sensitive customer information.,7.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,N/A CVE-2023-45893,An indirect Object Reference (IDOR) in the Order and Invoice pages in Floorsight Customer Portal Q3 2023 allows an unauthenticated remote attacker to view sensitive customer information.,7.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,N/A CVE-2023-47458,An issue in SpringBlade v.3.7.0 and before allows a remote attacker to escalate privileges via the lack of permissions control framework.,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,N/A CVE-2024-0194,"A vulnerability, which was classified as critical, has been found in CodeAstro Internet Banking System up to 1.0. This issue affects some unknown processing of the file pages_account.php of the component Profile Picture Handler. The manipulation leads to unrestricted upload. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-249509 was assigned to this vulnerability.",6.3,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L,N/A CVE-2024-0195,"A vulnerability, which was classified as critical, was found in spider-flow 0.4.3. Affected is the function FunctionService.saveFunction of the file src/main/java/org/spiderflow/controller/FunctionController.java. The manipulation leads to code injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-249510 is the identifier assigned to this vulnerability.",6.3,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L,N/A CVE-2024-21623,"OTCLient is an alternative tibia client for otserv. Prior to commit db560de0b56476c87a2f967466407939196dd254, the /mehah/otclient ""`Analysis - SonarCloud`"" workflow is vulnerable to an expression injection in Actions, allowing an attacker to run commands remotely on the runner, leak secrets, and alter the repository using this workflow. Commit db560de0b56476c87a2f967466407939196dd254 contains a fix for this issue.",9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,N/A CVE-2024-21627,"PrestaShop is an open-source e-commerce platform. Prior to versions 8.1.3 and 1.7.8.11, some event attributes are not detected by the `isCleanHTML` method. Some modules using the `isCleanHTML` method could be vulnerable to cross-site scripting. Versions 8.1.3 and 1.7.8.11 contain a patch for this issue. The best workaround is to use the `HTMLPurifier` library to sanitize html input coming from users. The library is already available as a dependency in the PrestaShop project. Beware though that in legacy object models, fields of `HTML` type will call `isCleanHTML`.",8.1,CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:N,N/A CVE-2020-26623,SQL Injection vulnerability discovered in Gila CMS 1.15.4 and earlier allows a remote attacker to execute arbitrary web scripts via the Area parameter under the Administration>Widget tab after the login portal.,3.8,CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N,N/A CVE-2020-26624,A SQL injection vulnerability was discovered in Gila CMS 1.15.4 and earlier which allows a remote attacker to execute arbitrary web scripts via the ID parameter after the login portal.,3.8,CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N,N/A CVE-2020-26625,A SQL injection vulnerability was discovered in Gila CMS 1.15.4 and earlier which allows a remote attacker to execute arbitrary web scripts via the 'user_id' parameter after the login portal.,3.8,CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N,N/A CVE-2023-4164,"There is a possible information disclosure due to a missing permission check. This could lead to local information disclosure of health data with no additional execution privileges needed. ",8.4,CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,Google Android CVE-2023-50019,"An issue was discovered in open5gs v2.6.6. InitialUEMessage, Registration request sent at a specific time can crash AMF due to incorrect error handling of Nudm_UECM_Registration response.",5.9,CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H,N/A CVE-2023-50020,An issue was discovered in open5gs v2.6.6. SIGPIPE can be used to crash AMF.,7.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,N/A CVE-2023-6339,Google Nest WiFi Pro root code-execution & user-data compromise,10.0,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H,Google Nest Wifi Pro Firmware CVE-2024-0196,A vulnerability has been found in Magic-Api up to 2.0.1 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /resource/file/api/save?auto=1. The manipulation leads to code injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-249511.,6.3,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L,N/A CVE-2024-21628,"PrestaShop is an open-source e-commerce platform. Prior to version 8.1.3, the isCleanHtml method is not used on this this form, which makes it possible to store a cross-site scripting payload in the database. The impact is low because the HTML is not interpreted in BO, thanks to twig's escape mechanism. In FO, the cross-site scripting attack is effective, but only impacts the customer sending it, or the customer session from which it was sent. This issue affects those who have a module fetching these messages from the DB and displaying it without escaping HTML. Version 8.1.3 contains a patch for this issue.",5.4,CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:N/A:L,N/A CVE-2024-21629,"Rust EVM is an Ethereum Virtual Machine interpreter. In `rust-evm`, a feature called `record_external_operation` was introduced, allowing library users to record custom gas changes. This feature can have some bogus interactions with the call stack. In particular, during finalization of a `CREATE` or `CREATE2`, in the case that the substack execution happens successfully, `rust-evm` will first commit the substate, and then call `record_external_operation(Write(out_code.len()))`. If `record_external_operation` later fails, this error is returned to the parent call stack, instead of `Succeeded`. Yet, the substate commitment already happened. This causes smart contracts able to commit state changes, when the parent caller contract receives zero address (which usually indicates that the execution has failed). This issue only impacts library users with custom `record_external_operation` that returns errors. The issue is patched in release 0.41.1. No known workarounds are available.",5.9,CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N,N/A CVE-2024-21632,"omniauth-microsoft_graph provides an Omniauth strategy for the Microsoft Graph API. Prior to versions 2.0.0, the implementation did not validate the legitimacy of the `email` attribute of the user nor did it give/document an option to do so, making it susceptible to nOAuth misconfiguration in cases when the `email` is used as a trusted user identifier. This could lead to account takeover. Version 2.0.0 contains a fix for this issue. ",8.6,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L,N/A CVE-2023-48418,"In checkDebuggingDisallowed of DeviceVersionFragment.java, there is a     possible way to access adb before SUW completion due to an insecure default     value. This could lead to local escalation of privilege with no additional     execution privileges needed. User interaction is not needed for     exploitation",10.0,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H,Google Pixel Watch Firmware CVE-2023-49549,An issue in Cesanta mjs 2.20.0 allows a remote attacker to cause a denial of service via the mjs_getretvalpos function in the msj.c file.,7.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,N/A CVE-2023-49550,An issue in Cesanta mjs 2.20.0 allows a remote attacker to cause a denial of service via the mjs+0x4ec508 component.,7.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,N/A CVE-2023-49551,An issue in Cesanta mjs 2.20.0 allows a remote attacker to cause a denial of service via the mjs_op_json_parse function in the msj.c file.,7.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,N/A CVE-2023-49552,An Out of Bounds Write in Cesanta mjs 2.20.0 allows a remote attacker to cause a denial of service via the mjs_op_json_stringify function in the msj.c file.,7.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,N/A CVE-2023-49553,An issue in Cesanta mjs 2.20.0 allows a remote attacker to cause a denial of service via the mjs_destroy function in the msj.c file.,7.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,N/A CVE-2023-49554,Use After Free vulnerability in YASM 1.3.0.86.g9def allows a remote attacker to cause a denial of service via the do_directive function in the modules/preprocs/nasm/nasm-pp.c component.,5.5,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H,N/A CVE-2023-49555,An issue in YASM 1.3.0.86.g9def allows a remote attacker to cause a denial of service via the expand_smacro function in the modules/preprocs/nasm/nasm-pp.c component.,5.5,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H,N/A CVE-2023-49556,Buffer Overflow vulnerability in YASM 1.3.0.86.g9def allows a remote attacker to cause a denial of service via the expr_delete_term function in the libyasm/expr.c component.,5.5,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H,N/A CVE-2023-49557,An issue in YASM 1.3.0.86.g9def allows a remote attacker to cause a denial of service via the yasm_section_bcs_first function in the libyasm/section.c component.,5.5,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H,N/A CVE-2023-49558,An issue in YASM 1.3.0.86.g9def allows a remote attacker to cause a denial of service via the expand_mmac_params function in the modules/preprocs/nasm/nasm-pp.c component.,5.5,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H,N/A CVE-2023-41776,"There is a local privilege escalation vulnerability of ZTE's ZXCLOUD iRAI.Attackers with regular user privileges can create a fake process, and to escalate local privileges. ",6.7,CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H,N/A CVE-2023-41779,"There is an illegal memory access vulnerability of ZTE's ZXCLOUD iRAI product.When the vulnerability is exploited by an attacker with the common user permission, the physical machine will be crashed. ",4.4,CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H,N/A CVE-2023-41780,"There is an unsafe DLL loading vulnerability in ZTE ZXCLOUD iRAI. Due to the  program  failed to adequately validate the user's input, an attacker could exploit this vulnerability  to escalate local privileges. ",6.4,CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H,N/A CVE-2023-41783,"There is a command injection vulnerability of ZTE's ZXCLOUD iRAI. Due to the  program  failed to adequately validate the user's input, an attacker could exploit this vulnerability  to escalate local privileges. ",4.3,CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L,N/A CVE-2023-50345,"HCL DRYiCE MyXalytics is impacted by an Open Redirect vulnerability which could allow an attacker to redirect users to malicious sites, potentially leading to phishing attacks or other security threats. ",3.7,CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N,N/A CVE-2023-50346,"HCL DRYiCE MyXalytics is impacted by an information disclosure vulnerability. Certain endpoints within the application disclose detailed file information. ",3.1,CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N,N/A CVE-2023-50348,"HCL DRYiCE MyXalytics is impacted by an improper error handling vulnerability. The application returns detailed error messages that can provide an attacker with insight into the application, system, etc. ",3.1,CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N,N/A CVE-2023-50350,"HCL DRYiCE MyXalytics is impacted by the use of a broken cryptographic algorithm for encryption, potentially giving an attacker ability to decrypt sensitive information. ",8.2,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N,N/A CVE-2023-50351,"HCL DRYiCE MyXalytics is impacted by the use of an insecure key rotation mechanism which can allow an attacker to compromise the confidentiality or integrity of data. ",8.2,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N,N/A CVE-2023-45722,"HCL DRYiCE MyXalytics is impacted by path traversal arbitrary file read vulnerability because it uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory.  The product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory. Potential exploits can completely disrupt or take over the application. ",8.8,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,N/A CVE-2023-45723,"HCL DRYiCE MyXalytics is impacted by path traversal vulnerability which allows file upload capability.  Certain endpoints permit users to manipulate the path (including the file name) where these files are stored on the server. ",7.6,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L,N/A CVE-2023-45724,"HCL DRYiCE MyXalytics product is impacted by unauthenticated file upload vulnerability. The web application permits the upload of a certain file without requiring user authentication. ",8.2,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N,N/A CVE-2023-50341,"HCL DRYiCE MyXalytics is impacted by Improper Access Control (Obsolete web pages) vulnerability. Discovery of outdated and accessible web pages, reflects a ""Missing Access Control"" vulnerability, which could lead to inadvertent exposure of sensitive information and/or exposing a vulnerable endpoint. ",7.6,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L,N/A CVE-2023-50342,"HCL DRYiCE MyXalytics is impacted by an Insecure Direct Object Reference (IDOR) vulnerability.  A user can obtain certain details about another user as a result of improper access control. ",7.1,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N,N/A CVE-2023-50343,"HCL DRYiCE MyXalytics is impacted by an Improper Access Control (Controller APIs) vulnerability. Certain API endpoints are accessible to Customer Admin Users that can allow access to sensitive information about other users. ",8.3,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L,N/A CVE-2023-50344,"HCL DRYiCE MyXalytics is impacted by improper access control (Unauthenticated File Download) vulnerability. An unauthenticated user can download certain files. ",5.4,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N,N/A CVE-2023-46308,"In Plotly plotly.js before 2.25.2, plot API calls have a risk of __proto__ being polluted in expandObjectPaths or nestedProperty.",9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,N/A CVE-2023-6629,"The POST SMTP Mailer – Email log, Delivery Failure Notifications and Best Mail SMTP for WordPress plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the ‘msg’ parameter in all versions up to, and including, 2.8.6 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.",6.1,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N,N/A CVE-2023-7027,"The POST SMTP Mailer – Email log, Delivery Failure Notifications and Best Mail SMTP for WordPress plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘device’ header in all versions up to, and including, 2.8.7 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.",7.2,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N,N/A CVE-2023-42358,"An issue was discovered in O-RAN Software Community ric-plt-e2mgr in the G-Release environment, allows remote attackers to cause a denial of service (DoS) via a crafted request to the E2Manager API component.",7.7,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H,N/A CVE-2023-6524,The MapPress Maps for WordPress plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the map title parameter in all versions up to and including 2.88.13 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers with contributor access or higher to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.,6.4,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N,N/A CVE-2023-6600,"The OMGF | GDPR/DSGVO Compliant, Faster Google Fonts. Easy. plugin for WordPress is vulnerable to unauthorized modification of data and Stored Cross-Site Scripting due to a missing capability check on the update_settings() function hooked via admin_init in all versions up to, and including, 5.7.9. This makes it possible for unauthenticated attackers to update the plugin's settings which can be used to inject Cross-Site Scripting payloads and delete entire directories. PLease note there were several attempted patched, and we consider 5.7.10 to be the most sufficiently patched.",8.6,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H,N/A CVE-2023-6980,"The WP SMS – Messaging & SMS Notification for WordPress, WooCommerce, GravityForms, etc plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 6.5. This is due to missing or incorrect nonce validation on the 'delete' action of the wp-sms-subscribers page. This makes it possible for unauthenticated attackers to delete subscribers via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.",4.3,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N,N/A CVE-2023-6981,"The WP SMS – Messaging & SMS Notification for WordPress, WooCommerce, GravityForms, etc plugin for WordPress is vulnerable to SQL Injection via the 'group_id' parameter in all versions up to, and including, 6.5 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with contributor-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. This can leveraged to achieve Reflected Cross-site Scripting.",6.1,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N,N/A CVE-2023-47473,Directory Traversal vulnerability in fuwushe.org iFair versions 23.8_ad0 and before allows an attacker to obtain sensitive information via a crafted script.,7.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,N/A CVE-2023-6986,"The EmbedPress – Embed PDF, YouTube, Google Docs, Vimeo, Wistia Videos, Audios, Maps & Any Documents in Gutenberg & Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's embed_oembed_html shortcode in all versions up to 3.9.5 (exclusive) due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.",6.4,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N,N/A CVE-2023-50922,"An issue was discovered on GL.iNet devices through 4.5.0. Attackers who are able to steal the AdminToken cookie can execute arbitrary code by uploading a crontab-formatted file to a specific directory and waiting for its execution. This affects A1300 4.4.6, AX1800 4.4.6, AXT1800 4.4.6, MT3000 4.4.6, MT2500 4.4.6, MT6000 4.5.0, MT1300 4.3.7, MT300N-V2 4.3.7, AR750S 4.3.7, AR750 4.3.7, AR300M 4.3.7, and B1300 4.3.7.",7.2,CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H,"Gl-Inet Gl-Mt2500 Firmware 4.4.6, Gl-Inet Gl-Mt3000 Firmware 4.4.6, Gl-Inet Gl-Ar750 Firmware 4.3.7, Gl-Inet Gl-A1300 Firmware 4.4.6, Gl-Inet Gl-Mt1300 Firmware 4.3.7, Gl-Inet Gl-Ax1800 Firmware 4.4.6, Gl-Inet Gl-Ar750S Firmware 4.3.7, Gl-Inet Gl-Mt300N-V2 Firmware 4.3.7, Gl-Inet Gl-Axt1800 Firmware 4.4.6, Gl-Inet Gl-Ar300M Firmware 4.3.7, Gl-Inet Gl-Mt6000 Firmware 4.5.0, Gl-Inet Gl-B1300 Firmware 4.3.7" CVE-2024-0207,HTTP3 dissector crash in Wireshark 4.2.0 allows denial of service via packet injection or crafted capture file,7.8,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,N/A CVE-2024-0208,"GVCP dissector crash in Wireshark 4.2.0, 4.0.0 to 4.0.11, and 3.6.0 to 3.6.19 allows denial of service via packet injection or crafted capture file",7.8,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,N/A CVE-2024-0209,"IEEE 1609.2 dissector crash in Wireshark 4.2.0, 4.0.0 to 4.0.11, and 3.6.0 to 3.6.19 allows denial of service via packet injection or crafted capture file",7.8,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,N/A CVE-2024-0210,Zigbee TLV dissector crash in Wireshark 4.2.0 allows denial of service via packet injection or crafted capture file,7.8,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,N/A CVE-2024-0211,DOCSIS dissector crash in Wireshark 4.2.0 allows denial of service via packet injection or crafted capture file,7.8,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,N/A CVE-2023-38674,"FPE in paddle.nanmedian in PaddlePaddle before 2.6.0. This flaw can cause a runtime crash and a denial of service. ",4.7,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:L,N/A CVE-2023-38675,"FPE in paddle.linalg.matrix_rank in PaddlePaddle before 2.6.0. This flaw can cause a runtime crash and a denial of service. ",4.7,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:L,N/A CVE-2023-38676,"Nullptr in paddle.dot in PaddlePaddle before 2.6.0. This flaw can cause a runtime crash and a denial of service. ",4.7,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:L,N/A CVE-2023-38677,"FPE in paddle.linalg.eig in PaddlePaddle before 2.6.0. This flaw can cause a runtime crash and a denial of service. ",4.7,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:L,N/A CVE-2023-38678,"OOB access in paddle.mode in PaddlePaddle before 2.6.0. This flaw can cause a runtime crash and a denial of service. ",4.7,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:L,N/A CVE-2023-50921,"An issue was discovered on GL.iNet devices through 4.5.0. Attackers can invoke the add_user interface in the system module to gain root privileges. This affects A1300 4.4.6, AX1800 4.4.6, AXT1800 4.4.6, MT3000 4.4.6, MT2500 4.4.6, MT6000 4.5.0, MT1300 4.3.7, MT300N-V2 4.3.7, AR750S 4.3.7, AR750 4.3.7, AR300M 4.3.7, and B1300 4.3.7.",9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,"Gl-Inet Gl-Mt2500 Firmware 4.4.6, Gl-Inet Gl-Mt3000 Firmware 4.4.6, Gl-Inet Gl-Ar750 Firmware 4.3.7, Gl-Inet Gl-A1300 Firmware 4.4.6, Gl-Inet Gl-Mt1300 Firmware 4.3.7, Gl-Inet Gl-Ax1800 Firmware 4.4.6, Gl-Inet Gl-Ar750S Firmware 4.3.7, Gl-Inet Gl-Mt300N-V2 Firmware 4.3.7, Gl-Inet Gl-Axt1800 Firmware 4.4.6, Gl-Inet Gl-Ar300M Firmware 4.3.7, Gl-Inet Gl-Mt6000 Firmware 4.5.0, Gl-Inet Gl-B1300 Firmware 4.3.7" CVE-2023-52302,"Nullptr in paddle.nextafter in PaddlePaddle before 2.6.0. This flaw can cause a runtime crash and a denial of service. ",4.7,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:L,N/A CVE-2023-52303,"Nullptr in paddle.put_along_axis in PaddlePaddle before 2.6.0. This flaw can cause a runtime crash and a denial of service. ",4.7,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:L,N/A CVE-2023-52304,"Stack overflow in paddle.searchsorted in PaddlePaddle before 2.6.0. This flaw can lead to a denial of service, or even more damage. ",8.2,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:L,N/A CVE-2023-52305,"FPE in paddle.topk in PaddlePaddle before 2.6.0. This flaw can cause a runtime crash and a denial of service. ",4.7,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:L,N/A CVE-2023-52306,"FPE in paddle.lerp in PaddlePaddle before 2.6.0. This flaw can cause a runtime crash and a denial of service. ",4.7,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:L,N/A CVE-2023-52307,"Stack overflow in paddle.linalg.lu_unpack in PaddlePaddle before 2.6.0. This flaw can lead to a denial of service, or even more damage. ",8.2,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:L,N/A CVE-2023-52308,"FPE in paddle.amin in PaddlePaddle before 2.6.0. This flaw can cause a runtime crash and a denial of service. ",4.7,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:L,N/A CVE-2023-52309,"Heap buffer overflow in paddle.repeat_interleave in PaddlePaddle before 2.6.0. This flaw can lead to a denial of service, information disclosure, or more damage is possible. ",8.2,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:L,N/A CVE-2023-52310,"PaddlePaddle before 2.6.0 has a command injection in get_online_pass_interval. This resulted in the ability to execute arbitrary commands on the operating system. ",9.6,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H,N/A CVE-2023-52311,"PaddlePaddle before 2.6.0 has a command injection in _wget_download. This resulted in the ability to execute arbitrary commands on the operating system. ",9.6,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H,N/A CVE-2023-52312,"Nullptr dereference in paddle.crop in PaddlePaddle before 2.6.0. This flaw can cause a runtime crash and a denial of service. ",4.7,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:L,N/A CVE-2023-52313,"FPE in paddle.argmin and paddle.argmax in PaddlePaddle before 2.6.0. This flaw can cause a runtime crash and a denial of service. ",4.7,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:L,N/A CVE-2023-52314,"PaddlePaddle before 2.6.0 has a command injection in convert_shape_compare. This resulted in the ability to execute arbitrary commands on the operating system. ",9.6,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H,N/A CVE-2023-6621,"The POST SMTP WordPress plugin before 2.8.7 does not sanitise and escape the msg parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin.",6.1,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N,N/A CVE-2023-6747,"The Best WordPress Gallery Plugin – FooGallery plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the custom attributes in all versions up to, and including, 2.3.3 due to insufficient input sanitization and output escaping. This makes it possible for contributors and above to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.",6.4,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N,N/A CVE-2023-6984,"The PowerPack Addons for Elementor (Free Widgets, Extensions and Templates) plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.7.13. This is due to missing or incorrect nonce validation in the powerpack-lite-for-elementor/classes/class-pp-admin-settings.php file. This makes it possible for unauthenticated attackers to modify and reset plugin settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.",5.3,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N,N/A CVE-2023-7068,"The WooCommerce PDF Invoices, Packing Slips, Delivery Notes and Shipping Labels plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on theprint_packinglist action in all versions up to, and including, 4.3.0. This makes it possible for authenticated attackers, with subscriber-level access and above, to export orders which can contain sensitive information.",4.3,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N,N/A CVE-2023-51784,"Improper Control of Generation of Code ('Code Injection') vulnerability in Apache InLong.This issue affects Apache InLong: from 1.5.0 through 1.9.0, which could lead to Remote Code Execution. Users are advised to upgrade to Apache InLong's 1.10.0 or cherry-pick [1] to solve it. [1] https://github.com/apache/inlong/pull/9329",9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,N/A CVE-2023-51785,"Deserialization of Untrusted Data vulnerability in Apache InLong.This issue affects Apache InLong: from 1.7.0 through 1.9.0, the attackers can make a arbitrary file read attack using mysql driver. Users are advised to upgrade to Apache InLong's 1.10.0 or cherry-pick [1] to solve it. [1]  https://github.com/apache/inlong/pull/9331",7.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,N/A CVE-2024-0201,"The Product Expiry for WooCommerce plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'save_settings' function in versions up to, and including, 2.5. This makes it possible for authenticated attackers, with subscriber-level permissions or above to update plugin settings.",5.4,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L,N/A CVE-2023-37608,An issue in Automatic Systems SOC FL9600 FirstLane V06 lego_T04E00 allows a remote attacker to obtain sensitive information because there is an automaticsystems super admin account with astech as its hardcoded password.,7.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,Automaticsystems Soc Fl9600 Firstlane Firmware 06 CVE-2023-39655,"A host header injection vulnerability exists in the NPM package @perfood/couch-auth versions <= 0.20.0. By sending a specially crafted host header in the forgot password request, it is possible to send password reset links to users which, once clicked, lead to an attacker-controlled server and thus leak the password reset token. This may allow an attacker to reset other users' passwords and take over their accounts.",9.6,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H,N/A CVE-2023-50092,APIIDA API Gateway Manager for Broadcom Layer7 v2023.2 is vulnerable to Cross Site Scripting (XSS).,6.1,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N,N/A CVE-2023-37607,Directory Traversal in Automatic Systems SOC FL9600 FirstLane V06 lego_T04E00 allows a remote attacker to obtain sensitive information via csvServer.php?file= with a .. in the dir parameter.,7.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,Automaticsystems Soc Fl9600 Firstlane Firmware 06 CVE-2023-50093,APIIDA API Gateway Manager for Broadcom Layer7 v2023.2.2 is vulnerable to Host Header Injection.,6.1,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N,N/A CVE-2023-45559,An issue in Tamaki_hamanoki Line v.13.6.1 allows attackers to send crafted notifications via leakage of the channel access token.,8.2,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N,N/A CVE-2023-30617,"Kruise provides automated management of large-scale applications on Kubernetes. Starting in version 0.8.0 and prior to versions 1.3.1, 1.4.1, and 1.5.2, an attacker who has gained root privilege of the node that kruise-daemon run can leverage the kruise-daemon pod to list all secrets in the entire cluster. After that, the attacker can leverage the ""captured"" secrets (e.g. the kruise-manager service account token) to gain extra privileges such as pod modification. Versions 1.3.1, 1.4.1, and 1.5.2 fix this issue. A workaround is available. For users that do not require imagepulljob functions, they can modify kruise-daemon-role to drop the cluster level secret get/list privilege.",6.5,CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N,N/A CVE-2023-46738,"CubeFS is an open-source cloud-native file storage system. A security vulnerability was found in CubeFS HandlerNode in versions prior to 3.3.1 that could allow authenticated users to send maliciously-crafted requests that would crash the ObjectNode and deny other users from using it. The root cause was improper handling of incoming HTTP requests that could allow an attacker to control the ammount of memory that the ObjectNode would allocate. A malicious request could make the ObjectNode allocate more memory that the machine had available, and the attacker could exhaust memory by way of a single malicious request. An attacker would need to be authenticated in order to invoke the vulnerable code with their malicious request and have permissions to delete objects. In addition, the attacker would need to know the names of existing buckets of the CubeFS deployment - otherwise the request would be rejected before it reached the vulnerable code. As such, the most likely attacker is an inside user or an attacker that has breached the account of an existing user in the cluster. The issue has been patched in v3.3.1. There is no other mitigation besides upgrading.",6.5,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H,N/A CVE-2024-21907,"Newtonsoft.Json before version 13.0.1 is affected by a mishandling of exceptional conditions vulnerability. Crafted data that is passed to the JsonConvert.DeserializeObject method may trigger a StackOverflow exception resulting in denial of service. Depending on the usage of the library, an unauthenticated and remote attacker may be able to cause the denial of service condition. ",7.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,N/A CVE-2024-21908," TinyMCE versions before 5.9.0 are affected by a stored cross-site scripting vulnerability. An unauthenticated and remote attacker could insert crafted HTML into the editor resulting in arbitrary JavaScript execution in another user's browser. ",6.1,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N,N/A CVE-2024-21909,"PeterO.Cbor versions 4.0.0 through 4.5.0 are vulnerable to a denial of service vulnerability. An attacker may trigger the denial of service condition by providing crafted data to the DecodeFromBytes or other decoding mechanisms in PeterO.Cbor. Depending on the usage of the library, an unauthenticated and remote attacker may be able to cause the denial of service condition. ",7.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,N/A CVE-2024-21910,"TinyMCE versions before 5.10.0 are affected by a cross-site scripting vulnerability. A remote and unauthenticated attacker could introduce crafted image or link URLs that would result in the execution of arbitrary JavaScript in an editing user's browser. ",6.1,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N,N/A CVE-2024-21911,TinyMCE versions before 5.6.0 are affected by a stored cross-site scripting vulnerability. An unauthenticated and remote attacker could insert crafted HTML into the editor resulting in arbitrary JavaScript execution in another user's browser.,6.1,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N,N/A CVE-2023-46739,"CubeFS is an open-source cloud-native file storage system. A vulnerability was found during in the CubeFS master component in versions prior to 3.3.1 that could allow an untrusted attacker to steal user passwords by carrying out a timing attack. The root case of the vulnerability was that CubeFS used raw string comparison of passwords. The vulnerable part of CubeFS was the UserService of the master component. The UserService gets instantiated when starting the server of the master component. The issue has been patched in v3.3.1. For impacted users, there is no other way to mitigate the issue besides upgrading.",6.5,CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L,N/A CVE-2023-46740,"CubeFS is an open-source cloud-native file storage system. Prior to version 3.3.1, CubeFS used an insecure random string generator to generate user-specific, sensitive keys used to authenticate users in a CubeFS deployment. This could allow an attacker to predict and/or guess the generated string and impersonate a user thereby obtaining higher privileges. When CubeFS creates new users, it creates a piece of sensitive information for the user called the “accessKey”. To create the ""accesKey"", CubeFS uses an insecure string generator which makes it easy to guess and thereby impersonate the created user. An attacker could leverage the predictable random string generator and guess a users access key and impersonate the user to obtain higher privileges. The issue has been fixed in v3.3.1. There is no other mitigation than to upgrade.",6.5,CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L,N/A CVE-2023-46741,"CubeFS is an open-source cloud-native file storage system. A vulnerability was found in CubeFS prior to version 3.3.1 that could allow users to read sensitive data from the logs which could allow them escalate privileges. CubeFS leaks configuration keys in plaintext format in the logs. These keys could allow anyone to carry out operations on blobs that they otherwise do not have permissions for. For example, an attacker that has succesfully retrieved a secret key from the logs can delete blogs from the blob store. The attacker can either be an internal user with limited privileges to read the log, or they can be an external user who has escalated privileges sufficiently to access the logs. The vulnerability has been patched in v3.3.1. There is no other mitigation than upgrading. ",4.8,CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L,N/A CVE-2023-46742,"CubeFS is an open-source cloud-native file storage system. CubeFS prior to version 3.3.1 was found to leak users secret keys and access keys in the logs in multiple components. When CubeCS creates new users, it leaks the users secret key. This could allow a lower-privileged user with access to the logs to retrieve sensitive information and impersonate other users with higher privileges than themselves. The issue has been patched in v3.3.1. There is no other mitigation than upgrading CubeFS.",4.8,CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L,N/A CVE-2023-50253,"Laf is a cloud development platform. In the Laf version design, the log uses communication with k8s to quickly retrieve logs from the container without the need for additional storage. However, in version 1.0.0-beta.13 and prior, this interface does not verify the permissions of the pod, which allows authenticated users to obtain any pod logs under the same namespace through this method, thereby obtaining sensitive information printed in the logs. As of time of publication, no known patched versions exist.",9.6,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H,N/A CVE-2023-6004,"A flaw was found in libssh. By utilizing the ProxyCommand or ProxyJump feature, users can exploit unchecked hostname syntax on the client. This issue may allow an attacker to inject malicious code into the command of the features mentioned through the hostname parameter.",4.8,CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L,"Fedoraproject Fedora 38, Redhat Enterprise Linux 9.0, Redhat Enterprise Linux 8.0" CVE-2024-0217,"A use-after-free flaw was found in PackageKitd. In some conditions, the order of cleanup mechanics for a transaction could be impacted. As a result, some memory access could occur on memory regions that were previously freed. Once freed, a memory region can be reused for other allocations and any previously stored data in this memory region is considered lost.",3.3,CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L,"Fedoraproject Fedora 39, Redhat Enterprise Linux 9.0, Redhat Enterprise Linux 8.0" CVE-2024-21622,"Craft is a content management system. This is a potential moderate impact, low complexity privilege escalation vulnerability in Craft starting in 3.x prior to 3.9.6 and 4.x prior to 4.4.16 with certain user permissions setups. This has been fixed in Craft 4.4.16 and Craft 3.9.6. Users should ensure they are running at least those versions.",5.4,CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:L,N/A CVE-2024-21631,"Vapor is an HTTP web framework for Swift. Prior to version 4.90.0, Vapor's `vapor_urlparser_parse` function uses `uint16_t` indexes when parsing a URI's components, which may cause integer overflows when parsing untrusted inputs. This vulnerability does not affect Vapor directly but could impact applications relying on the URI type for validating user input. The URI type is used in several places in Vapor. A developer may decide to use URI to represent a URL in their application (especially if that URL is then passed to the HTTP Client) and rely on its public properties and methods. However, URI may fail to properly parse a valid (albeit abnormally long) URL, due to string ranges being converted to 16-bit integers. An attacker may use this behavior to trick the application into accepting a URL to an untrusted destination. By padding the port number with zeros, an attacker can cause an integer overflow to occur when the URL authority is parsed and, as a result, spoof the host. Version 4.90.0 contains a patch for this issue. As a workaround, validate user input before parsing as a URI or, if possible, use Foundation's `URL` and `URLComponents` utilities. ",6.5,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N,N/A CVE-2024-21633,"Apktool is a tool for reverse engineering Android APK files. In versions 2.9.1 and prior, Apktool infers resource files' output path according to their resource names which can be manipulated by attacker to place files at desired location on the system Apktool runs on. Affected environments are those in which an attacker may write/overwrite any file that user has write access, and either user name is known or cwd is under user folder. Commit d348c43b24a9de350ff6e5bd610545a10c1fc712 contains a patch for this issue.",7.8,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,N/A CVE-2023-46929,An issue discovered in GPAC 2.3-DEV-rev605-gfc9e29089-master in MP4Box in gf_avc_change_vui /afltest/gpac/src/media_tools/av_parsers.c:6872:55 allows attackers to crash the application.,7.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,N/A CVE-2023-50090,Arbitrary File Write vulnerability in the saveReportFile method of ureport2 2.2.9 and before allows attackers to write arbitrary files and run arbitrary commands via crafted POST request.,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,N/A CVE-2023-5879,"Users’ product account authentication data was stored in clear text in The Genie Company Aladdin Connect Mobile Application Version 5.65 Build 2075 (and below) on Android Devices. This allows the attacker, with access to the android device, to potentially retrieve users' clear text authentication credentials. ",6.8,CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,N/A CVE-2023-5880,"When the Genie Company Aladdin Connect garage door opener (Retrofit-Kit Model ALDCM) is placed into configuration mode the web servers “Garage Door Control Module Setup” page is vulnerable to XSS via a broadcast SSID name containing malicious code with client side Java Script and/or HTML. This allows the attacker to inject malicious code with client side Java Script and/or HTML into the users' web browser.  ",8.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:H,Geniecompany Aladdin Connect Garage Door Opener Firmware CVE-2023-5881,"Unauthenticated access permitted to web interface page The Genie Company Aladdin Connect (Retrofit-Kit Model ALDCM) ""Garage Door Control Module Setup"" and modify the Garage door's SSID settings. ",8.2,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N,Geniecompany Aladdin Connect Garage Door Opener Firmware CVE-2023-49442,Deserialization of Untrusted Data in jeecgFormDemoController in JEECG 4.0 and earlier allows attackers to run arbitrary code via crafted POST request.,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,N/A CVE-2023-6338,Uncontrolled search path vulnerabilities were reported in the Lenovo Universal Device Client (UDC) that could allow an attacker with local access to execute code with elevated privileges.,7.8,CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,N/A CVE-2023-6540,A vulnerability was reported in the Lenovo Browser Mobile and Lenovo Browser HD Apps for Android that could allow an attacker to craft a payload that could result in the disclosure of sensitive information.,6.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N,N/A CVE-2023-50256,"Froxlor is open source server administration software. Prior to version 2.1.2, it was possible to submit the registration form with the essential fields, such as the username and password, left intentionally blank. This inadvertent omission allowed for a bypass of the mandatory field requirements (e.g. surname, company name) established by the system. Version 2.1.2 fixes this issue. ",7.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N,N/A CVE-2023-5138,"Glitch detection is not enabled by default for the CortexM33 core in Silicon Labs secure vault high parts EFx32xG2xB, except EFR32xG21B.",6.8,CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,N/A CVE-2024-21634,"Amazon Ion is a Java implementation of the Ion data notation. Prior to version 1.10.5, a potential denial-of-service issue exists in `ion-java` for applications that use `ion-java` to deserialize Ion text encoded data, or deserialize Ion text or binary encoded data into the `IonValue` model and then invoke certain `IonValue` methods on that in-memory representation. An actor could craft Ion data that, when loaded by the affected application and/or processed using the `IonValue` model, results in a `StackOverflowError` originating from the `ion-java` library. The patch is included in `ion-java` 1.10.5. As a workaround, do not load data which originated from an untrusted source or that could have been tampered with.",7.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,N/A CVE-2024-20802,Improper access control vulnerability in Samsung DeX prior to SMR Jan-2024 Release 1 allows owner to access other users' notification in a multi-user environment.,4.6,CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,N/A CVE-2024-20803,Improper authentication vulnerability in Bluetooth pairing process prior to SMR Jan-2024 Release 1 allows remote attackers to establish pairing process without user interaction.,6.8,CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L,"Samsung Android 12.0, Samsung Android 11.0, Samsung Android 13.0, Samsung Android 14.0" CVE-2024-20804,"Path traversal vulnerability in FileUriConverter of MyFiles prior to SMR Jan-2024 Release 1 in Android 11 and Android 12, and version 14.5.00.21 in Android 13 allows local attackers to write arbitrary file.",4.0,CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N,"Samsung Android 12.0, Samsung Android 11.0, Samsung Android 13.0" CVE-2024-20805,"Path traversal vulnerability in ZipCompressor of MyFiles prior to SMR Jan-2024 Release 1 in Android 11 and Android 12, and version 14.5.00.21 in Android 13 allows local attackers to write arbitrary file.",3.3,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N,"Samsung Android 12.0, Samsung Android 11.0, Samsung Android 13.0" CVE-2024-20806,Improper access control in Notification service prior to SMR Jan-2024 Release 1 allows local attacker to access notification data.,6.2,CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,"Samsung Android 12.0, Samsung Android 11.0, Samsung Android 13.0, Samsung Android 14.0" CVE-2024-20807,Implicit intent hijacking vulnerability in Samsung Email prior to version 6.1.90.16 allows local attacker to get sensitive information.,3.3,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N,N/A CVE-2024-20808,Improper access control vulnerability in Nearby device scanning prior version 11.1.14.7 allows local attacker to access data.,4.0,CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N,N/A CVE-2024-20809,Improper access control vulnerability in Nearby device scanning prior version 11.1.14.7 allows local attacker to access data.,4.0,CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N,N/A CVE-2024-0222,Use after free in ANGLE in Google Chrome prior to 120.0.6099.199 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High),8.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,"Fedoraproject Fedora 39, Fedoraproject Fedora 38" CVE-2024-0223,Heap buffer overflow in ANGLE in Google Chrome prior to 120.0.6099.199 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High),8.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,"Fedoraproject Fedora 39, Fedoraproject Fedora 38" CVE-2024-0224,Use after free in WebAudio in Google Chrome prior to 120.0.6099.199 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High),8.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,"Fedoraproject Fedora 39, Fedoraproject Fedora 38" CVE-2024-0225,Use after free in WebGPU in Google Chrome prior to 120.0.6099.199 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High),8.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,"Fedoraproject Fedora 39, Fedoraproject Fedora 38" CVE-2023-6498,"The Complianz – GDPR/CCPA Cookie Consent plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to and including 6.5.5 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.",4.4,CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N,N/A CVE-2023-6733,"The WP-Members Membership Plugin plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 3.4.8 via the wpmem_field shortcode. This makes it possible for authenticated attackers, with contributor access and above, to extract sensitive data including user emails, password hashes, usernames, and more.",6.5,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N,N/A CVE-2023-6738,"The Page Builder: Pagelayer – Drag and Drop website builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'pagelayer_header_code', 'pagelayer_body_open_code', and 'pagelayer_footer_code' meta fields in all versions up to, and including, 1.7.8 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This appears to be a reintroduction of a vulnerability patched in version 1.7.7.",5.4,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N,N/A CVE-2023-29962,S-CMS v5.0 was discovered to contain an arbitrary file read vulnerability.,6.5,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N,N/A CVE-2023-52322,ecrire/public/assembler.php in SPIP before 4.1.13 and 4.2.x before 4.2.7 allows XSS because input from _request() is not restricted to safe characters such as alphanumerics.,6.1,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N,N/A CVE-2023-41784," Permissions and Access Control Vulnerability in ZTE Red Magic 8 Pro ",6.6,CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:L/I:H/A:L,Zte Redmagic 8 Pro Firmware gen_cn_nx729jv1.0.0b21mr CVE-2023-50082,"Aoyun Technology pbootcms V3.1.2 is vulnerable to Incorrect Access Control, allows remote attackers to gain sensitive information via session leakage allows a user to avoid logging into the backend management platform.",7.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,N/A CVE-2023-50630,Cross Site Scripting (XSS) vulnerability in xiweicheng TMS v.2.28.0 allows a remote attacker to execute arbitrary code via a crafted script to the click here function.,6.1,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N,N/A CVE-2022-2081,"A vulnerability exists in the HCI Modbus TCP function included in the product versions listed above. If the HCI Modbus TCP is enabled and configured, an attacker could exploit the vulnerability by sending a specially crafted message to the RTU500 in a high rate, causing the targeted RTU500 CMU to reboot. The vulnerability is caused by a lack of flood control which eventually if exploited causes an internal stack overflow in the HCI Modbus TCP function.",7.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,"Hitachienergy Rtu530 Firmware, Hitachienergy Rtu520 Firmware, Hitachienergy Rtu540 Firmware 13.3.1, Hitachienergy Rtu560 Firmware, Hitachienergy Rtu530 Firmware 13.3.1, Hitachienergy Rtu540 Firmware, Hitachienergy Rtu520 Firmware 13.3.1, Hitachienergy Rtu560 Firmware 13.3.1" CVE-2022-3864," A vulnerability exists in the Relion update package signature validation. A tampered update package could cause the IED to restart. After restart the device is back to normal operation. An attacker could exploit the vulnerability by first gaining access to the system with security privileges and attempt to update the IED with a malicious update package. Successful exploitation of this vulnerability will cause the IED to restart, causing a temporary Denial of Service. ",4.5,CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H,"Hitachienergy Relion 650 Firmware 2.2.4, Hitachienergy Relion 670 Firmware 2.2.2, Hitachienergy Relion 670 Firmware 2.2.3, Hitachienergy Relion 670 Firmware 2.2.1, Hitachienergy Relion Sam600-Io Firmware 2.2.1, Hitachienergy Relion 650 Firmware 2.2.5, Hitachienergy Relion 650 Firmware 2.2.0, Hitachienergy Relion 670 Firmware 2.2.4, Hitachienergy Relion 670 Firmware 2.2.5, Hitachienergy Relion 670 Firmware 2.2.0, Hitachienergy Relion 650 Firmware 2.2.1" CVE-2023-6944,"A flaw was found in the Red Hat Developer Hub (RHDH). The catalog-import function leaks GitLab access tokens on the frontend when the base64 encoded GitLab token includes a newline at the end of the string. The sanitized error can display on the frontend, including the raw access token. Upon gaining access to this token and depending on permissions, an attacker could push malicious code to repositories, delete resources in Git, revoke or generate new keys, and sign code illegitimately.",5.7,CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N,N/A CVE-2023-7044,"The Essential Addons for Elementor – Best Elementor Templates, Widgets, Kits & WooCommerce Builders plugin for WordPress is vulnerable to Stored Cross-Site Scripting via custom ID in all versions up to, and including, 5.9.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers with contributor access and higher to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.",6.4,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N,N/A CVE-2021-40367,A vulnerability has been identified in syngo fastView (All versions). The affected application lacks proper validation of user-supplied data when parsing DICOM files. This could result in an out-of-bounds write past the end of an allocated structure. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-15097),7.8,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,N/A CVE-2021-42028,A vulnerability has been identified in syngo fastView (All versions). The affected application lacks proper validation of user-supplied data when parsing BMP files. This could result in an out-of-bounds write past the end of an allocated structure. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-14860),7.8,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,N/A CVE-2021-45465,A vulnerability has been identified in syngo fastView (All versions). The affected application lacks proper validation of user-supplied data when parsing BMP files. This could result in a write-what-where condition and an attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-15696),7.8,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,N/A CVE-2023-6992,"Cloudflare version of zlib library was found to be vulnerable to memory corruption issues affecting the deflation algorithm implementation (deflate.c). The issues resulted from improper input validation and heap-based buffer overflow. A local attacker could exploit the problem during compression using a crafted malicious file potentially leading to denial of service of the software. Patches: The issue has been patched in commit 8352d10 https://github.com/cloudflare/zlib/commit/8352d108c05db1bdc5ac3bdf834dad641694c13c . The upstream repository is not affected. ",4.0,CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L,N/A CVE-2023-49622,"Billing Software v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'itemnameid' parameter of the material_bill.php?action=itemRelation resource does not validate the characters received and they are sent unfiltered to the database. ",9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,N/A CVE-2023-49624,"Billing Software v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'cancelid' parameter of the material_bill.php resource does not validate the characters received and they are sent unfiltered to the database. ",9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,N/A CVE-2023-49625,"Billing Software v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'id' parameter of the partylist_edit_submit.php resource does not validate the characters received and they are sent unfiltered to the database. ",9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,N/A CVE-2023-49633,"Billing Software v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'buyer_address' parameter of the buyer_detail_submit.php resource does not validate the characters received and they are sent unfiltered to the database. ",9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,N/A CVE-2023-49639,"Billing Software v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'customer_details' parameter of the buyer_invoice_submit.php resource does not validate the characters received and they are sent unfiltered to the database. ",9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,N/A CVE-2023-49658,"Billing Software v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'bank_details' parameter of the party_submit.php resource does not validate the characters received and they are sent unfiltered to the database. ",9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,N/A CVE-2023-49665,"Billing Software v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'quantity[]' parameter of the submit_delivery_list.php resource does not validate the characters received and they are sent unfiltered to the database. ",9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,N/A CVE-2023-49666,"Billing Software v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'custmer_details' parameter of the submit_material_list.php resource does not validate the characters received and they are sent unfiltered to the database. ",9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,N/A CVE-2023-50743,"Online Notice Board System v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'dd' parameter of the registration.php resource does not validate the characters received and they are sent unfiltered to the database. ",9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,N/A CVE-2023-50752,"Online Notice Board System v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'e' parameter of the login.php resource does not validate the characters received and they are sent unfiltered to the database. ",9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,N/A CVE-2023-50753,"Online Notice Board System v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'dd' parameter of the user/update_profile.php resource does not validate the characters received and they are sent unfiltered to the database. ",9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,N/A CVE-2023-3726,"OCSInventory allow stored email template with special characters that lead to a Stored cross-site Scripting. ",4.9,CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N,N/A CVE-2023-50760,"Online Notice Board System v1.0 is vulnerable to an Insecure File Upload vulnerability on the 'f' parameter of user/update_profile_pic.php page, allowing an authenticated attacker to obtain Remote Code Execution on the server hosting the application. ",8.8,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,N/A CVE-2023-50862,"Travel Website v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'hotelIDHidden' parameter of the booking.php resource does not validate the characters received and they are sent unfiltered to the database. ",9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,N/A CVE-2023-50863,"Travel Website v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'hotelIDHidden' parameter of the generateReceipt.php resource does not validate the characters received and they are sent unfiltered to the database. ",9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,N/A CVE-2023-50864,"Travel Website v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'hotelId' parameter of the hotelDetails.php resource does not validate the characters received and they are sent unfiltered to the database. ",9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,N/A CVE-2023-50865,"Travel Website v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'city' parameter of the hotelSearch.php resource does not validate the characters received and they are sent unfiltered to the database. ",9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,N/A CVE-2023-50866,"Travel Website v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'username' parameter of the loginAction.php resource does not validate the characters received and they are sent unfiltered to the database. ",9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,N/A CVE-2023-50867,"Travel Website v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'username' parameter of the signupAction.php resource does not validate the characters received and they are sent unfiltered to the database. ",9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,N/A CVE-2024-21625,"SideQuest is a place to get virtual reality applications for Oculus Quest. The SideQuest desktop application uses deep links with a custom protocol (`sidequest://`) to trigger actions in the application from its web contents. Because, prior to version 0.10.35, the deep link URLs were not sanitized properly in all cases, a one-click remote code execution can be achieved in cases when a device is connected, the user is presented with a malicious link and clicks it from within the application. As of version 0.10.35, the custom protocol links within the electron application are now being parsed and sanitized properly.",8.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,N/A CVE-2023-6551,"As a simple library, class.upload.php does not perform an in-depth check on uploaded files, allowing a stored XSS vulnerability when the default configuration is used. Developers must be aware of that fact and use extension whitelisting accompanied by forcing the server to always provide content-type based on the file extension. The README has been updated to include these guidelines.",5.4,CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N,N/A CVE-2023-6270,"A flaw was found in the ATA over Ethernet (AoE) driver in the Linux kernel. The aoecmd_cfg_pkts() function improperly updates the refcnt on `struct net_device`, and a use-after-free can be triggered by racing between the free on the struct and the access through the `skbtxq` global queue. This could lead to a denial of service condition or potential code execution.",7.0,CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H,"Fedoraproject Fedora 39, Linux Linux Kernel" CVE-2023-51154,Jizhicms v2.5 was discovered to contain an arbitrary file download vulnerability via the component /admin/c/PluginsController.php.,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,N/A CVE-2023-51812,Tenda AX3 v16.03.12.11 was discovered to contain a remote code execution (RCE) vulnerability via the list parameter at /goform/SetNetControlList.,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,Tenda Ax3 Firmware 16.03.12.11 CVE-2024-21636,"view_component is a framework for building reusable, testable, and encapsulated view components in Ruby on Rails. Versions prior to 3.9.0 and 2.83.0 have a cross-site scripting vulnerability that has the potential to impact anyone rendering a component directly from a controller with the view_component gem. Note that only components that define a `#call` method (i.e. instead of using a sidecar template) are affected. The return value of the `#call` method is not sanitized and can include user-defined content. In addition, the return value of the `#output_postamble` methodis not sanitized, which can also lead to cross-site scripting issues. Versions 3.9.0 and 2.83.0 have been released and fully mitigate both the `#call` and the `#output_postamble` vulnerabilities. As a workaround, sanitize the return value of `#call`.",6.1,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N,N/A CVE-2024-0241,"encoded_id-rails versions before 1.0.0.beta2 are affected by an uncontrolled resource consumption vulnerability. A remote and unauthenticated attacker might cause a denial of service condition by sending an HTTP request with an extremely long ""id"" parameter. ",7.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,N/A CVE-2024-22047,"A race condition exists in Audited 4.0.0 to 5.3.3 that can result in an authenticated user to cause audit log entries to be attributed to another user. ",3.1,CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N,N/A CVE-2024-22048,"govuk_tech_docs versions from 2.0.2 to before 3.3.1 are vulnerable to a cross-site scripting vulnerability. Malicious JavaScript may be executed in the user's browser if a malicious search result is displayed on the search page. ",6.1,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N,N/A CVE-2024-22049,httparty before 0.21.0 is vulnerable to an assumed-immutable web parameter vulnerability. A remote and unauthenticated attacker can provide a crafted filename parameter during multipart/form-data uploads which could result in attacker controlled filenames being written.,5.3,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N,N/A CVE-2024-22050,"Path traversal in the static file service in Iodine less than 0.7.33 allows an unauthenticated, remote attacker to read files outside the public folder via malicious URLs. ",7.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,N/A CVE-2024-22051,"CommonMarker versions prior to 0.23.4 are at risk of an integer overflow vulnerability. This vulnerability can result in possibly unauthenticated remote attackers to cause heap memory corruption, potentially leading to an information leak or remote code execution, via parsing tables with marker rows that contain more than UINT16_MAX columns. ",9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,N/A CVE-2023-41782," There is a DLL hijacking vulnerability in ZTE ZXCLOUD iRAI, an attacker could place a fake DLL file in a specific directory and successfully exploit this vulnerability to execute malicious code. ",3.9,CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:L,N/A CVE-2023-6493,"The Depicter Slider – Responsive Image Slider, Video Slider & Post Slider plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.0.6. This is due to missing or incorrect nonce validation on the 'save' function. This makes it possible for unauthenticated attackers to modify the plugin's settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. CVE-2023-51491 appears to be a duplicate of this issue.",4.3,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N,N/A CVE-2024-22075,Firefly III (aka firefly-iii) before 6.1.1 allows webhooks HTML Injection.,6.1,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N,N/A CVE-2023-52323,"PyCryptodome and pycryptodomex before 3.19.1 allow side-channel leakage for OAEP decryption, exploitable for a Manger attack.",5.9,CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N,N/A CVE-2024-22086,"handle_request in http.c in cherry through 4b877df has an sscanf stack-based buffer overflow via a long URI, leading to remote code execution.",9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,N/A CVE-2024-22087,"route in main.c in Pico HTTP Server in C through f3b69a6 has an sprintf stack-based buffer overflow via a long URI, leading to remote code execution.",9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,N/A CVE-2024-22088,"Lotos WebServer through 0.1.1 (commit 3eb36cc) has a use-after-free in buffer_avail() at buffer.h via a long URI, because realloc is mishandled.",9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,N/A CVE-2023-51277,nbviewer-app (aka Jupyter Notebook Viewer) before 0.1.6 has the get-task-allow entitlement for release builds.,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,N/A CVE-2020-13878,IrfanView B3D PlugIns before version 4.56 has a B3d.dll!+27ef heap-based out-of-bounds write.,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,N/A CVE-2020-13879,IrfanView B3D PlugIns before version 4.56 has a B3d.dll!+214f heap-based out-of-bounds write.,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,N/A CVE-2023-51502,"Authorization Bypass Through User-Controlled Key vulnerability in WooCommerce WooCommerce Stripe Payment Gateway.This issue affects WooCommerce Stripe Payment Gateway: from n/a through 7.6.1. ",7.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N,N/A CVE-2023-52150,"Cross-Site Request Forgery (CSRF) vulnerability in Ovation S.R.L. Dynamic Content for Elementor.This issue affects Dynamic Content for Elementor: from n/a before 2.12.5. ",8.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,N/A CVE-2023-52178,"Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in MojofyWP WP Affiliate Disclosure allows Stored XSS.This issue affects WP Affiliate Disclosure: from n/a through 1.2.7. ",6.5,CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L,N/A CVE-2023-52184,"Cross-Site Request Forgery (CSRF) vulnerability in WP Job Portal WP Job Portal – A Complete Job Board.This issue affects WP Job Portal – A Complete Job Board: from n/a through 2.0.6. ",4.3,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N,N/A CVE-2020-13880,IrfanView B3D PlugIns before version 4.56 has a B3d.dll!+1cbf heap-based out-of-bounds write.,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,N/A CVE-2023-50027,"SQL Injection vulnerability in Buy Addons baproductzoommagnifier module for PrestaShop versions 1.0.16 and before, allows remote attackers to escalate privileges and gain sensitive information via BaproductzoommagnifierZoomModuleFrontController::run() method.",9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,N/A CVE-2023-52123,"Cross-Site Request Forgery (CSRF) vulnerability in WPChill Strong Testimonials.This issue affects Strong Testimonials: from n/a through 3.1.10. ",4.3,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N,N/A CVE-2023-52127,"Cross-Site Request Forgery (CSRF) vulnerability in WPClever WPC Product Bundles for WooCommerce.This issue affects WPC Product Bundles for WooCommerce: from n/a through 7.3.1. ",4.3,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N,N/A CVE-2023-52128,"Cross-Site Request Forgery (CSRF) vulnerability in WhiteWP White Label – WordPress Custom Admin, Custom Login Page, and Custom Dashboard.This issue affects White Label – WordPress Custom Admin, Custom Login Page, and Custom Dashboard: from n/a through 2.9.0. ",4.3,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N,N/A CVE-2023-52129,"Cross-Site Request Forgery (CSRF) vulnerability in Michael Winkler teachPress.This issue affects teachPress: from n/a through 9.0.4. ",6.3,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L,N/A CVE-2023-52130,"Cross-Site Request Forgery (CSRF) vulnerability in wp.Insider, wpaffiliatemgr Affiliates Manager.This issue affects Affiliates Manager: from n/a through 2.9.31. ",4.3,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N,N/A CVE-2023-52136,"Cross-Site Request Forgery (CSRF) vulnerability in Smash Balloon Custom Twitter Feeds – A Tweets Widget or X Feed Widget.This issue affects Custom Twitter Feeds – A Tweets Widget or X Feed Widget: from n/a through 2.1.2. ",4.3,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N,N/A CVE-2023-52145,"Cross-Site Request Forgery (CSRF) vulnerability in Marios Alexandrou Republish Old Posts.This issue affects Republish Old Posts: from n/a through 1.21. ",4.3,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N,N/A CVE-2023-52149,"Cross-Site Request Forgery (CSRF) vulnerability in Wow-Company Floating Button.This issue affects Floating Button: from n/a through 6.0. ",5.4,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L,N/A CVE-2023-50991,"Buffer Overflow vulnerability in Tenda i29 versions 1.0 V1.0.0.5 and 1.0 V1.0.0.2, allows remote attackers to cause a denial of service (DoS) via the pingIp parameter in the pingSet function.",7.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,"Tenda I29 Firmware 1.0.0.2, Tenda I29 Firmware 1.0.0.5" CVE-2023-51535,"Cross-Site Request Forgery (CSRF) vulnerability in СleanTalk - Anti-Spam Protection Spam protection, Anti-Spam, FireWall by CleanTalk.This issue affects Spam protection, Anti-Spam, FireWall by CleanTalk: from n/a through 6.20. ",4.3,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N,N/A CVE-2023-51538,"Cross-Site Request Forgery (CSRF) vulnerability in Awesome Support Team Awesome Support – WordPress HelpDesk & Support Plugin.This issue affects Awesome Support – WordPress HelpDesk & Support Plugin: from n/a through 6.1.5. ",4.3,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N,N/A CVE-2023-51539,"Cross-Site Request Forgery (CSRF) vulnerability in Apollo13Themes Apollo13 Framework Extensions.This issue affects Apollo13 Framework Extensions: from n/a through 1.9.1. ",4.3,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N,N/A CVE-2023-51668,"Cross-Site Request Forgery (CSRF) vulnerability in WP Zone Inline Image Upload for BBPress.This issue affects Inline Image Upload for BBPress: from n/a through 1.1.18. ",4.3,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N,N/A CVE-2023-51673,"Cross-Site Request Forgery (CSRF) vulnerability in Designful Stylish Price List – Price Table Builder & QR Code Restaurant Menu.This issue affects Stylish Price List – Price Table Builder & QR Code Restaurant Menu: from n/a through 7.0.17. ",5.4,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L,N/A CVE-2023-51678,"Cross-Site Request Forgery (CSRF) vulnerability in Doofinder Doofinder WP & WooCommerce Search.This issue affects Doofinder WP & WooCommerce Search: from n/a through 2.0.33. ",4.3,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N,N/A CVE-2023-52119,"Cross-Site Request Forgery (CSRF) vulnerability in Icegram Icegram Engage – WordPress Lead Generation, Popup Builder, CTA, Optins and Email List Building.This issue affects Icegram Engage – WordPress Lead Generation, Popup Builder, CTA, Optins and Email List Building: from n/a through 3.1.18. ",4.3,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N,N/A CVE-2023-52120,"Cross-Site Request Forgery (CSRF) vulnerability in Basix NEX-Forms – Ultimate Form Builder – Contact forms and much more.This issue affects NEX-Forms – Ultimate Form Builder – Contact forms and much more: from n/a through 8.5.2. ",5.4,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L,N/A CVE-2023-52121,"Cross-Site Request Forgery (CSRF) vulnerability in NitroPack Inc. NitroPack – Cache & Speed Optimization for Core Web Vitals, Defer CSS & JavaScript, Lazy load Images.This issue affects NitroPack – Cache & Speed Optimization for Core Web Vitals, Defer CSS & JavaScript, Lazy load Images: from n/a through 1.10.2. ",5.4,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L,N/A CVE-2023-52122,"Cross-Site Request Forgery (CSRF) vulnerability in PressTigers Simple Job Board.This issue affects Simple Job Board: from n/a through 2.10.6. ",4.3,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N,N/A CVE-2022-46839,"Unrestricted Upload of File with Dangerous Type vulnerability in JS Help Desk JS Help Desk – Best Help Desk & Support Plugin.This issue affects JS Help Desk – Best Help Desk & Support Plugin: from n/a through 2.7.1. ",10.0,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H,N/A CVE-2023-52143,"Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Naa986 WP Stripe Checkout.This issue affects WP Stripe Checkout: from n/a through 1.2.2.37. ",7.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,N/A CVE-2023-52146,"Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Aaron J 404 Solution.This issue affects 404 Solution: from n/a through 2.33.0. ",5.3,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N,N/A CVE-2023-52148,"Exposure of Sensitive Information to an Unauthorized Actor vulnerability in wp.Insider, wpaffiliatemgr Affiliates Manager.This issue affects Affiliates Manager: from n/a through 2.9.30. ",5.3,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N,N/A CVE-2023-52151,"Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Uncanny Automator, Uncanny Owl Uncanny Automator – Automate everything with the #1 no-code automation and integration plugin.This issue affects Uncanny Automator – Automate everything with the #1 no-code automation and integration plugin: from n/a through 5.1.0.2. ",5.3,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N,N/A CVE-2023-52124,"Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in ShapedPlugin LLC WP Tabs – Responsive Tabs Plugin for WordPress allows Stored XSS.This issue affects WP Tabs – Responsive Tabs Plugin for WordPress: from n/a through 2.2.0. ",6.5,CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L,N/A CVE-2023-52125,"Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in webvitaly iframe allows Stored XSS.This issue affects iframe: from n/a through 4.8. ",6.5,CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L,N/A CVE-2023-52126,"Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Suman Bhattarai Send Users Email.This issue affects Send Users Email: from n/a through 1.4.3. ",5.3,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N,N/A CVE-2024-0246,"A vulnerability classified as problematic has been found in IceWarp 12.0.2.1/12.0.3.1. This affects an unknown part of the file /install/ of the component Utility Download Handler. The manipulation of the argument lang with the input 1%27""()%26%25 leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-249759. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.",4.3,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N,N/A CVE-2023-34321,"Arm provides multiple helpers to clean & invalidate the cache for a given region. This is, for instance, used when allocating guest memory to ensure any writes (such as the ones during scrubbing) have reached memory before handing over the page to a guest. Unfortunately, the arithmetics in the helpers can overflow and would then result to skip the cache cleaning/invalidation. Therefore there is no guarantee when all the writes will reach the memory. ",3.3,CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N,Xen Xen CVE-2023-34322,"For migration as well as to work around kernels unaware of L1TF (see XSA-273), PV guests may be run in shadow paging mode. Since Xen itself needs to be mapped when PV guests run, Xen and shadowed PV guests run directly the respective shadow page tables. For 64-bit PV guests this means running on the shadow of the guest root page table. In the course of dealing with shortage of memory in the shadow pool associated with a domain, shadows of page tables may be torn down. This tearing down may include the shadow root page table that the CPU in question is presently running on. While a precaution exists to supposedly prevent the tearing down of the underlying live page table, the time window covered by that precaution isn't large enough. ",7.8,CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,Xen Xen CVE-2023-34323,"When a transaction is committed, C Xenstored will first check the quota is correct before attempting to commit any nodes. It would be possible that accounting is temporarily negative if a node has been removed outside of the transaction. Unfortunately, some versions of C Xenstored are assuming that the quota cannot be negative and are using assert() to confirm it. This will lead to C Xenstored crash when tools are built without -DNDEBUG (this is the default). ",5.5,CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H,Xen Xen CVE-2023-34324,"Closing of an event channel in the Linux kernel can result in a deadlock. This happens when the close is being performed in parallel to an unrelated Xen console action and the handling of a Xen console interrupt in an unprivileged guest. The closing of an event channel is e.g. triggered by removal of a paravirtual device on the other side. As this action will cause console messages to be issued on the other side quite often, the chance of triggering the deadlock is not neglectable. Note that 32-bit Arm-guests are not affected, as the 32-bit Linux kernel on Arm doesn't use queued-RW-locks, which are required to trigger the issue (on Arm32 a waiting writer doesn't block further readers to get the lock).",4.9,CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H,"Xen Xen, Linux Linux Kernel" CVE-2023-34325," [This CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] libfsimage contains parsing code for several filesystems, most of them based on grub-legacy code. libfsimage is used by pygrub to inspect guest disks. Pygrub runs as the same user as the toolstack (root in a priviledged domain). At least one issue has been reported to the Xen Security Team that allows an attacker to trigger a stack buffer overflow in libfsimage. After further analisys the Xen Security Team is no longer confident in the suitability of libfsimage when run against guest controlled input with super user priviledges. In order to not affect current deployments that rely on pygrub patches are provided in the resolution section of the advisory that allow running pygrub in deprivileged mode. CVE-2023-4949 refers to the original issue in the upstream grub project (""An attacker with local access to a system (either through a disk or external drive) can present a modified XFS partition to grub-legacy in such a way to exploit a memory corruption in grub’s XFS file system implementation."") CVE-2023-34325 refers specifically to the vulnerabilities in Xen's copy of libfsimage, which is decended from a very old version of grub. ",7.8,CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,Xen Xen CVE-2023-34326,"The caching invalidation guidelines from the AMD-Vi specification (48882—Rev 3.07-PUB—Oct 2022) is incorrect on some hardware, as devices will malfunction (see stale DMA mappings) if some fields of the DTE are updated but the IOMMU TLB is not flushed. Such stale DMA mappings can point to memory ranges not owned by the guest, thus allowing access to unindented memory regions. ",7.8,CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,Xen Xen CVE-2023-34327," [This CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] AMD CPUs since ~2014 have extensions to normal x86 debugging functionality. Xen supports guests using these extensions. Unfortunately there are errors in Xen's handling of the guest state, leading to denials of service. 1) CVE-2023-34327 - An HVM vCPU can end up operating in the context of a previous vCPUs debug mask state. 2) CVE-2023-34328 - A PV vCPU can place a breakpoint over the live GDT. This allows the PV vCPU to exploit XSA-156 / CVE-2015-8104 and lock up the CPU entirely. ",5.5,CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H,Xen Xen CVE-2023-34328," [This CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] AMD CPUs since ~2014 have extensions to normal x86 debugging functionality. Xen supports guests using these extensions. Unfortunately there are errors in Xen's handling of the guest state, leading to denials of service. 1) CVE-2023-34327 - An HVM vCPU can end up operating in the context of a previous vCPUs debug mask state. 2) CVE-2023-34328 - A PV vCPU can place a breakpoint over the live GDT. This allows the PV vCPU to exploit XSA-156 / CVE-2015-8104 and lock up the CPU entirely. ",5.5,CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H,Xen Xen CVE-2023-39294,"An OS command injection vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow authenticated administrators to execute commands via a network. We have already fixed the vulnerability in the following versions: QTS 5.1.3.2578 build 20231110 and later QuTS hero h5.1.3.2578 build 20231110 and later ",6.6,CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:L,"Qnap Quts Hero h5.1.0.2424, Qnap Qts 5.1.1.2491, Qnap Qts 5.1.0.2444, Qnap Quts Hero h5.1.1.2488, Qnap Qts 5.1.0.2348, Qnap Quts Hero h5.1.0.2453, Qnap Qts 5.1.2.2533, Qnap Quts Hero h5.1.2.2534, Qnap Qts 5.1.0.2418, Qnap Qts 5.1.0.2399, Qnap Quts Hero h5.1.0.2466, Qnap Qts 5.1.0.2466, Qnap Quts Hero h5.1.0.2409" CVE-2023-39296,"A prototype pollution vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow users to override existing attributes with ones that have incompatible type, which may lead to a crash via a network. We have already fixed the vulnerability in the following versions: QTS 5.1.3.2578 build 20231110 and later QuTS hero h5.1.3.2578 build 20231110 and later ",7.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,"Qnap Quts Hero h5.1.0.2424, Qnap Qts 5.1.1.2491, Qnap Qts 5.1.0.2444, Qnap Quts Hero h5.1.1.2488, Qnap Qts 5.1.0.2348, Qnap Quts Hero h5.1.0.2453, Qnap Qts 5.1.2.2533, Qnap Quts Hero h5.1.2.2534, Qnap Qts 5.1.0.2418, Qnap Qts 5.1.0.2399, Qnap Quts Hero h5.1.0.2466, Qnap Qts 5.1.0.2466, Qnap Quts Hero h5.1.0.2409" CVE-2023-41287,"A SQL injection vulnerability has been reported to affect Video Station. If exploited, the vulnerability could allow users to inject malicious code via a network. We have already fixed the vulnerability in the following version: Video Station 5.7.2 ( 2023/11/23 ) and later ",4.3,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N,N/A CVE-2023-41288,"An OS command injection vulnerability has been reported to affect Video Station. If exploited, the vulnerability could allow users to execute commands via a network. We have already fixed the vulnerability in the following version: Video Station 5.7.2 ( 2023/11/23 ) and later ",8.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,N/A CVE-2023-41289,"An OS command injection vulnerability has been reported to affect QcalAgent. If exploited, the vulnerability could allow authenticated users to execute commands via a network. We have already fixed the vulnerability in the following version: QcalAgent 1.1.8 and later ",6.3,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L,N/A CVE-2023-45039,"A buffer copy without checking size of input vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow authenticated administrators to execute code via a network. We have already fixed the vulnerability in the following versions: QTS 5.1.4.2596 build 20231128 and later QuTS hero h5.1.4.2596 build 20231128 and later ",3.8,CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L,"Qnap Quts Hero h5.1.0.2424, Qnap Qts 5.1.3.2578, Qnap Qts 5.1.1.2491, Qnap Qts 5.1.0.2444, Qnap Quts Hero h5.1.1.2488, Qnap Qts 5.1.0.2348, Qnap Quts Hero h5.1.0.2453, Qnap Qts 5.1.2.2533, Qnap Quts Hero h5.1.3.2578, Qnap Quts Hero h5.1.2.2534, Qnap Qts 5.1.0.2418, Qnap Qts 5.1.0.2399, Qnap Quts Hero h5.1.0.2466, Qnap Qts 5.1.0.2466, Qnap Quts Hero h5.1.0.2409" CVE-2023-45040,"A buffer copy without checking size of input vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow authenticated administrators to execute code via a network. We have already fixed the vulnerability in the following versions: QTS 5.1.4.2596 build 20231128 and later QuTS hero h5.1.4.2596 build 20231128 and later ",3.8,CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L,"Qnap Quts Hero h5.1.0.2424, Qnap Qts 5.1.3.2578, Qnap Qts 5.1.1.2491, Qnap Qts 5.1.0.2444, Qnap Quts Hero h5.1.1.2488, Qnap Qts 5.1.0.2348, Qnap Quts Hero h5.1.0.2453, Qnap Qts 5.1.2.2533, Qnap Quts Hero h5.1.3.2578, Qnap Quts Hero h5.1.2.2534, Qnap Qts 5.1.0.2418, Qnap Qts 5.1.0.2399, Qnap Quts Hero h5.1.0.2466, Qnap Qts 5.1.0.2466, Qnap Quts Hero h5.1.0.2409" CVE-2023-45041,"A buffer copy without checking size of input vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow authenticated administrators to execute code via a network. We have already fixed the vulnerability in the following versions: QTS 5.1.4.2596 build 20231128 and later QuTS hero h5.1.4.2596 build 20231128 and later ",3.8,CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L,"Qnap Quts Hero h5.1.0.2424, Qnap Qts 5.1.3.2578, Qnap Qts 5.1.1.2491, Qnap Qts 5.1.0.2444, Qnap Quts Hero h5.1.1.2488, Qnap Qts 5.1.0.2348, Qnap Quts Hero h5.1.0.2453, Qnap Qts 5.1.2.2533, Qnap Quts Hero h5.1.3.2578, Qnap Quts Hero h5.1.2.2534, Qnap Qts 5.1.0.2418, Qnap Qts 5.1.0.2399, Qnap Quts Hero h5.1.0.2466, Qnap Qts 5.1.0.2466, Qnap Quts Hero h5.1.0.2409" CVE-2023-45042,"A buffer copy without checking size of input vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow authenticated administrators to execute code via a network. We have already fixed the vulnerability in the following versions: QTS 5.1.4.2596 build 20231128 and later QuTS hero h5.1.4.2596 build 20231128 and later ",3.8,CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L,"Qnap Quts Hero h5.1.0.2424, Qnap Qts 5.1.3.2578, Qnap Qts 5.1.1.2491, Qnap Qts 5.1.0.2444, Qnap Quts Hero h5.1.1.2488, Qnap Qts 5.1.0.2348, Qnap Quts Hero h5.1.0.2453, Qnap Qts 5.1.2.2533, Qnap Quts Hero h5.1.3.2578, Qnap Quts Hero h5.1.2.2534, Qnap Qts 5.1.0.2418, Qnap Qts 5.1.0.2399, Qnap Quts Hero h5.1.0.2466, Qnap Qts 5.1.0.2466, Qnap Quts Hero h5.1.0.2409" CVE-2023-45043,"A buffer copy without checking size of input vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow authenticated administrators to execute code via a network. We have already fixed the vulnerability in the following versions: QTS 5.1.4.2596 build 20231128 and later QuTS hero h5.1.4.2596 build 20231128 and later ",3.8,CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L,"Qnap Quts Hero h5.1.0.2424, Qnap Qts 5.1.3.2578, Qnap Qts 5.1.1.2491, Qnap Qts 5.1.0.2444, Qnap Quts Hero h5.1.1.2488, Qnap Qts 5.1.0.2348, Qnap Quts Hero h5.1.0.2453, Qnap Qts 5.1.2.2533, Qnap Quts Hero h5.1.3.2578, Qnap Quts Hero h5.1.2.2534, Qnap Qts 5.1.0.2418, Qnap Qts 5.1.0.2399, Qnap Quts Hero h5.1.0.2466, Qnap Qts 5.1.0.2466, Qnap Quts Hero h5.1.0.2409" CVE-2023-45044,"A buffer copy without checking size of input vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow authenticated administrators to execute code via a network. We have already fixed the vulnerability in the following versions: QTS 5.1.4.2596 build 20231128 and later QuTS hero h5.1.4.2596 build 20231128 and later ",3.8,CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L,"Qnap Quts Hero h5.1.0.2424, Qnap Qts 5.1.3.2578, Qnap Qts 5.1.1.2491, Qnap Qts 5.1.0.2444, Qnap Quts Hero h5.1.1.2488, Qnap Qts 5.1.0.2348, Qnap Quts Hero h5.1.0.2453, Qnap Qts 5.1.2.2533, Qnap Quts Hero h5.1.3.2578, Qnap Quts Hero h5.1.2.2534, Qnap Qts 5.1.0.2418, Qnap Qts 5.1.0.2399, Qnap Quts Hero h5.1.0.2466, Qnap Qts 5.1.0.2466, Qnap Quts Hero h5.1.0.2409" CVE-2023-46835,"The current setup of the quarantine page tables assumes that the quarantine domain (dom_io) has been initialized with an address width of DEFAULT_DOMAIN_ADDRESS_WIDTH (48) and hence 4 page table levels. However dom_io being a PV domain gets the AMD-Vi IOMMU page tables levels based on the maximum (hot pluggable) RAM address, and hence on systems with no RAM above the 512GB mark only 3 page-table levels are configured in the IOMMU. On systems without RAM above the 512GB boundary amd_iommu_quarantine_init() will setup page tables for the scratch page with 4 levels, while the IOMMU will be configured to use 3 levels only, resulting in the last page table directory (PDE) effectively becoming a page table entry (PTE), and hence a device in quarantine mode gaining write access to the page destined to be a PDE. Due to this page table level mismatch, the sink page the device gets read/write access to is no longer cleared between device assignment, possibly leading to data leaks. ",5.5,CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N,Xen Xen CVE-2023-46836,"The fixes for XSA-422 (Branch Type Confusion) and XSA-434 (Speculative Return Stack Overflow) are not IRQ-safe. It was believed that the mitigations always operated in contexts with IRQs disabled. However, the original XSA-254 fix for Meltdown (XPTI) deliberately left interrupts enabled on two entry paths; one unconditionally, and one conditionally on whether XPTI was active. As BTC/SRSO and Meltdown affect different CPU vendors, the mitigations are not active together by default. Therefore, there is a race condition whereby a malicious PV guest can bypass BTC/SRSO protections and launch a BTC/SRSO attack against Xen. ",4.7,CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N,Xen Xen CVE-2023-46837,"Arm provides multiple helpers to clean & invalidate the cache for a given region. This is, for instance, used when allocating guest memory to ensure any writes (such as the ones during scrubbing) have reached memory before handing over the page to a guest. Unfortunately, the arithmetics in the helpers can overflow and would then result to skip the cache cleaning/invalidation. Therefore there is no guarantee when all the writes will reach the memory. This undefined behavior was meant to be addressed by XSA-437, but the approach was not sufficient.",3.3,CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N,Xen Xen CVE-2023-47219,"A SQL injection vulnerability has been reported to affect QuMagie. If exploited, the vulnerability could allow authenticated users to inject malicious code via a network. We have already fixed the vulnerability in the following version: QuMagie 2.2.1 and later ",3.5,CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N,N/A CVE-2023-47559,"A cross-site scripting (XSS) vulnerability has been reported to affect QuMagie. If exploited, the vulnerability could allow authenticated users to inject malicious code via a network. We have already fixed the vulnerability in the following version: QuMagie 2.2.1 and later ",5.5,CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:L,N/A CVE-2023-47560,"An OS command injection vulnerability has been reported to affect QuMagie. If exploited, the vulnerability could allow authenticated users to execute commands via a network. We have already fixed the vulnerability in the following version: QuMagie 2.2.1 and later ",7.4,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L,N/A CVE-2024-0247,A vulnerability classified as critical was found in CodeAstro Online Food Ordering System 1.0. This vulnerability affects unknown code of the file /admin/ of the component Admin Panel. The manipulation of the argument Username leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-249778 is the identifier assigned to this vulnerability.,7.3,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L,N/A CVE-2024-21641,"Flarum is open source discussion platform software. Prior to version 1.8.5, the Flarum `/logout` route includes a redirect parameter that allows any third party to redirect users from a (trusted) domain of the Flarum installation to redirect to any link. For logged-in users, the logout must be confirmed. Guests are immediately redirected. This could be used by spammers to redirect to a web address using a trusted domain of a running Flarum installation. The vulnerability has been fixed and published as flarum/core v1.8.5. As a workaround, some extensions modifying the logout route can remedy this issue if their implementation is safe.",6.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N,N/A CVE-2024-21642,"D-Tale is a visualizer for Pandas data structures. Users hosting versions D-Tale prior to 3.9.0 publicly can be vulnerable to server-side request forgery (SSRF), allowing attackers to access files on the server. Users should upgrade to version 3.9.0, where the `Load From the Web` input is turned off by default. The only workaround for versions earlier than 3.9.0 is to only host D-Tale to trusted users.",7.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,N/A CVE-2023-50612,"Insecure Permissions vulnerability in fit2cloud Cloud Explorer Lite version 1.4.1, allow local attackers to escalate privileges and obtain sensitive information via the cloud accounts parameter.",7.8,CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,N/A CVE-2023-39853,"SQL Injection vulnerability in Dzzoffice version 2.01, allows remote attackers to obtain sensitive information via the doobj and doevent parameters in the Network Disk backend module.",6.5,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N,N/A CVE-2023-50609,"Cross Site Scripting (XSS) vulnerability in AVA teaching video application service platform version 3.1, allows remote attackers to execute arbitrary code via a crafted script to ajax.aspx.",6.1,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N,N/A CVE-2023-46953,"SQL Injection vulnerability in ABO.CMS v.5.9.3, allows remote attackers to execute arbitrary code via the d parameter in the Documents module.",9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,N/A CVE-2023-50121,Autel EVO NANO drone flight control firmware version 1.6.5 is vulnerable to denial of service (DoS).,5.7,CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H,Autelrobotics Evo Nano Drone Firmware 1.6.5 CVE-2023-6798,"The RSS Aggregator by Feedzy – Feed to Post, Autoblogging, News & YouTube Video Feeds Aggregator plugin for WordPress is vulnerable to unauthorized settings update due to a missing capability check when updating settings in all versions up to, and including, 4.3.2. This makes it possible for authenticated attackers, with author-level access or above to change the plugin's settings including proxy settings, which are also exposed to authors.",5.4,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N,N/A CVE-2023-6801,"The RSS Aggregator by Feedzy – Feed to Post, Autoblogging, News & YouTube Video Feeds Aggregator plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 4.3.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with author-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.",6.4,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N,N/A CVE-2023-51441,"** UNSUPPORTED WHEN ASSIGNED ** Improper Input Validation vulnerability in Apache Axis allowed users with access to the admin service to perform possible SSRF This issue affects Apache Axis: through 1.3. As Axis 1 has been EOL we recommend you migrate to a different SOAP engine, such as Apache Axis 2/Java. Alternatively you could use a build of Axis with the patch from https://github.com/apache/axis-axis1-java/commit/685c309febc64aa393b2d64a05f90e7eb9f73e06 applied. The Apache Axis project does not expect to create an Axis 1.x release fixing this problem, though contributors that would like to work towards this are welcome. ",7.2,CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H,N/A CVE-2024-0260,"A vulnerability, which was classified as problematic, was found in SourceCodester Engineers Online Portal 1.0. Affected is an unknown function of the file change_password_teacher.php of the component Password Change. The manipulation leads to session expiration. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-249816.",4.3,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N,N/A CVE-2024-0261,A vulnerability has been found in Sentex FTPDMIN 0.96 and classified as problematic. Affected by this vulnerability is an unknown functionality of the component RNFR Command Handler. The manipulation leads to denial of service. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-249817 was assigned to this vulnerability.,5.3,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L,N/A CVE-2024-0262,A vulnerability was found in Online Job Portal 1.0 and classified as problematic. Affected by this issue is some unknown functionality of the file /Admin/News.php of the component Create News Page. The manipulation of the argument News with the input leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-249818 is the identifier assigned to this vulnerability.,2.4,CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N,N/A CVE-2024-0263,A vulnerability was found in ACME Ultra Mini HTTPd 1.21. It has been classified as problematic. This affects an unknown part of the component HTTP GET Request Handler. The manipulation leads to denial of service. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-249819.,5.3,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L,N/A CVE-2024-0264,A vulnerability was found in SourceCodester Clinic Queuing System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /LoginRegistration.php. The manipulation of the argument formToken leads to authorization bypass. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-249820.,7.3,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L,N/A CVE-2024-0265,A vulnerability was found in SourceCodester Clinic Queuing System 1.0. It has been rated as critical. This issue affects some unknown processing of the file /index.php of the component GET Parameter Handler. The manipulation of the argument page leads to file inclusion. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-249821 was assigned to this vulnerability.,6.3,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L,N/A CVE-2024-0266,A vulnerability classified as problematic has been found in Project Worlds Online Lawyer Management System 1.0. Affected is an unknown function of the component User Registration. The manipulation of the argument First Name leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-249822 is the identifier assigned to this vulnerability.,4.3,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N,N/A CVE-2024-0267,A vulnerability classified as critical was found in Kashipara Hospital Management System up to 1.0. Affected by this vulnerability is an unknown functionality of the file login.php of the component Parameter Handler. The manipulation of the argument email/password leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-249823.,7.3,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L,N/A CVE-2023-7208,A vulnerability classified as critical was found in Totolink X2000R_V2 2.0.0-B20230727.10434. This vulnerability affects the function formTmultiAP of the file /bin/boa. The manipulation leads to buffer overflow. VDB-249742 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.,8.0,CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,Totolink X2000R Firmware 2.0.0-b20230727.10434 CVE-2024-0268,"A vulnerability, which was classified as critical, has been found in Kashipara Hospital Management System up to 1.0. Affected by this issue is some unknown functionality of the file registration.php. The manipulation of the argument name/email/pass/gender/age/city leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-249824.",7.3,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L,N/A CVE-2024-0270,"A vulnerability, which was classified as critical, was found in Kashipara Food Management System up to 1.0. This affects an unknown part of the file item_list_submit.php. The manipulation of the argument item_name leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-249825 was assigned to this vulnerability.",6.3,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L,N/A CVE-2023-7209,A vulnerability was found in Uniway Router up to 2.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /boaform/device_reset.cgi of the component Device Reset Handler. The manipulation leads to denial of service. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-249758 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.,7.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,"Uniwayinfo Uw-311Vpw Firmware, Uniwayinfo Uw-323Dac Firmware, Uniwayinfo Uw-302Vp Firmware, Uniwayinfo Uw-101X Firmware, Uniwayinfo Uw-301Vpw Firmware" CVE-2024-0271,A vulnerability has been found in Kashipara Food Management System up to 1.0 and classified as critical. This vulnerability affects unknown code of the file addmaterial_edit.php. The manipulation of the argument id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-249826 is the identifier assigned to this vulnerability.,6.3,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L,N/A CVE-2023-7210,A vulnerability was found in OneNav up to 0.9.33. It has been classified as critical. This affects an unknown part of the file /index.php?c=api of the component API. The manipulation of the argument X-Token leads to improper authentication. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-249765 was assigned to this vulnerability.,7.3,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L,N/A CVE-2023-7211,A vulnerability was found in Uniway Router 2.0. It has been declared as critical. This vulnerability affects unknown code of the component Administrative Web Interface. The manipulation leads to reliance on ip address for authentication. The attack can be initiated remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. VDB-249766 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.,5.6,CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L,"Uniwayinfo Uw-311Vpw Firmware, Uniwayinfo Uw-323Dac Firmware, Uniwayinfo Uw-302Vp Firmware, Uniwayinfo Uw-101X Firmware, Uniwayinfo Uw-301Vpw Firmware" CVE-2024-0272,A vulnerability was found in Kashipara Food Management System up to 1.0 and classified as critical. This issue affects some unknown processing of the file addmaterialsubmit.php. The manipulation of the argument material_name leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-249827.,6.3,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L,N/A CVE-2024-0273,A vulnerability was found in Kashipara Food Management System up to 1.0. It has been classified as critical. Affected is an unknown function of the file addwaste_entry.php. The manipulation of the argument item_name leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-249828.,6.3,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L,N/A CVE-2024-0274,A vulnerability was found in Kashipara Food Management System up to 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file billAjax.php. The manipulation of the argument item_name leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-249829 was assigned to this vulnerability.,6.3,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L,N/A CVE-2024-0275,A vulnerability was found in Kashipara Food Management System up to 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file item_edit_submit.php. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-249830 is the identifier assigned to this vulnerability.,6.3,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L,N/A CVE-2024-0276,A vulnerability classified as critical has been found in Kashipara Food Management System up to 1.0. This affects an unknown part of the file rawstock_used_damaged_smt.php. The manipulation of the argument product_name leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-249831.,6.3,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L,N/A CVE-2024-0277,A vulnerability classified as critical was found in Kashipara Food Management System up to 1.0. This vulnerability affects unknown code of the file party_submit.php. The manipulation of the argument party_name leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-249832.,6.3,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L,N/A CVE-2024-0278,"A vulnerability, which was classified as critical, has been found in Kashipara Food Management System up to 1.0. This issue affects some unknown processing of the file partylist_edit_submit.php. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-249833 was assigned to this vulnerability.",6.3,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L,N/A CVE-2024-0279,"A vulnerability, which was classified as critical, was found in Kashipara Food Management System up to 1.0. Affected is an unknown function of the file item_list_edit.php. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-249834 is the identifier assigned to this vulnerability.",6.3,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L,N/A CVE-2024-0280,A vulnerability has been found in Kashipara Food Management System up to 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file item_type_submit.php. The manipulation of the argument type_name leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-249835.,6.3,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L,N/A CVE-2024-0281,A vulnerability was found in Kashipara Food Management System up to 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file loginCheck.php. The manipulation of the argument password leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-249836.,6.3,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L,N/A CVE-2024-0282,A vulnerability was found in Kashipara Food Management System up to 1.0. It has been classified as problematic. This affects an unknown part of the file addmaterialsubmit.php. The manipulation of the argument tin leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-249837 was assigned to this vulnerability.,3.5,CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N,N/A CVE-2024-0283,A vulnerability was found in Kashipara Food Management System up to 1.0. It has been declared as problematic. This vulnerability affects unknown code of the file party_details.php. The manipulation of the argument party_name leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-249838 is the identifier assigned to this vulnerability.,3.5,CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N,N/A CVE-2023-7212,A vulnerability classified as critical has been found in DeDeCMS up to 5.7.112. Affected is an unknown function of the file file_class.php of the component Backend. The manipulation leads to unrestricted upload. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-249768. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.,4.7,CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L,N/A CVE-2024-0284,A vulnerability was found in Kashipara Food Management System up to 1.0. It has been rated as problematic. This issue affects some unknown processing of the file party_submit.php. The manipulation of the argument party_address leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-249839.,3.5,CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N,N/A CVE-2024-0286,"A vulnerability, which was classified as problematic, was found in PHPGurukul Hospital Management System 1.0. This affects an unknown part of the file index.php#contact_us of the component Contact Form. The manipulation of the argument Name/Email/Message leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-249843.",4.3,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N,N/A CVE-2023-47145,"IBM Db2 for Windows (includes Db2 Connect Server) 10.5, 11.1, and 11.5 could allow a local user to escalate their privileges to the SYSTEM user using the MSI repair functionality. IBM X-Force ID: 270402.",8.4,CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,Microsoft Windows CVE-2023-7213,A vulnerability classified as critical was found in Totolink N350RT 9.3.5u.6139_B20201216. Affected by this vulnerability is the function main of the file /cgi-bin/cstecgi.cgi?action=login&flag=1 of the component HTTP POST Request Handler. The manipulation of the argument v33 leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-249769 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.,6.3,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L,Totolink N350Rt Firmware 9.3.5u.6139_b20201216 CVE-2023-7214,"A vulnerability, which was classified as critical, has been found in Totolink N350RT 9.3.5u.6139_B20201216. Affected by this issue is the function main of the file /cgi-bin/cstecgi.cgi?action=login of the component HTTP POST Request Handler. The manipulation of the argument v8 leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-249770 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.",6.3,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L,Totolink N350Rt Firmware 9.3.5u.6139_b20201216 CVE-2024-0287,A vulnerability was found in Kashipara Food Management System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file itemBillPdf.php. The manipulation of the argument printid leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-249848.,6.3,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L,N/A CVE-2024-0288,A vulnerability classified as critical has been found in Kashipara Food Management System 1.0. This affects an unknown part of the file rawstock_used_damaged_submit.php. The manipulation of the argument product_name leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-249849 was assigned to this vulnerability.,6.3,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L,N/A CVE-2024-0289,A vulnerability classified as critical was found in Kashipara Food Management System 1.0. This vulnerability affects unknown code of the file stock_entry_submit.php. The manipulation of the argument itemype leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-249850 is the identifier assigned to this vulnerability.,6.3,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L,N/A CVE-2024-0290,"A vulnerability, which was classified as critical, has been found in Kashipara Food Management System 1.0. This issue affects some unknown processing of the file stock_edit.php. The manipulation of the argument item_type leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-249851.",6.3,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L,N/A CVE-2024-0291,A vulnerability was found in Totolink LR1200GB 9.1.0u.6619_B20230130. It has been rated as critical. This issue affects the function UploadFirmwareFile of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument FileName leads to command injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-249857 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.,6.3,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L,Totolink Lr1200Gb Firmware 9.1.0u.6619_b20230130 CVE-2023-50948,"IBM Storage Fusion HCI 2.1.0 through 2.6.1 contains hard-coded credentials, such as a password or cryptographic key, which it uses for its own inbound authentication, outbound communication to external components, or encryption of internal data. IBM X-Force ID: 275671.",6.5,CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,N/A CVE-2023-7215,"A vulnerability, which was classified as problematic, has been found in Chanzhaoyu chatgpt-web 2.11.1. This issue affects some unknown processing. The manipulation of the argument Description with the input leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-249779.",3.5,CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N,N/A CVE-2024-0292,A vulnerability classified as critical has been found in Totolink LR1200GB 9.1.0u.6619_B20230130. Affected is the function setOpModeCfg of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument hostName leads to os command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-249858 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.,6.3,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L,Totolink Lr1200Gb Firmware 9.1.0u.6619_b20230130 CVE-2023-47140,IBM CICS Transaction Gateway 9.3 could allow a user to transfer or view files due to improper access controls.,4.0,CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N,N/A CVE-2024-0293,A vulnerability classified as critical was found in Totolink LR1200GB 9.1.0u.6619_B20230130. Affected by this vulnerability is the function setUploadSetting of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument FileName leads to os command injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-249859. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.,6.3,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L,Totolink Lr1200Gb Firmware 9.1.0u.6619_b20230130 CVE-2024-0294,"A vulnerability, which was classified as critical, has been found in Totolink LR1200GB 9.1.0u.6619_B20230130. Affected by this issue is the function setUssd of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument ussd leads to os command injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-249860. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.",7.3,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L,Totolink Lr1200Gb Firmware 9.1.0u.6619_b20230130 CVE-2024-0295,"A vulnerability, which was classified as critical, was found in Totolink LR1200GB 9.1.0u.6619_B20230130. This affects the function setWanCfg of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument hostName leads to os command injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-249861 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.",7.3,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L,Totolink Lr1200Gb Firmware 9.1.0u.6619_b20230130 CVE-2024-0296,A vulnerability has been found in Totolink N200RE 9.3.5u.6139_B20201216 and classified as critical. This vulnerability affects the function NTPSyncWithHost of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument host_time leads to os command injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-249862 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.,7.3,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L,Totolink N200Re Firmware 9.3.5u.6139_b20201216 CVE-2024-0297,A vulnerability was found in Totolink N200RE 9.3.5u.6139_B20201216 and classified as critical. This issue affects the function UploadFirmwareFile of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument FileName leads to os command injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-249863. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.,7.3,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L,Totolink N200Re Firmware 9.3.5u.6139_b20201216 CVE-2024-0298,A vulnerability was found in Totolink N200RE 9.3.5u.6139_B20201216. It has been classified as critical. Affected is the function setDiagnosisCfg of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument ip leads to os command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-249864. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.,7.3,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L,Totolink N200Re Firmware 9.3.5u.6139_b20201216 CVE-2024-0299,A vulnerability was found in Totolink N200RE 9.3.5u.6139_B20201216. It has been declared as critical. Affected by this vulnerability is the function setTracerouteCfg of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument command leads to os command injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-249865 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.,7.3,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L,Totolink N200Re Firmware 9.3.5u.6139_b20201216 CVE-2024-0300,A vulnerability was found in Byzoro Smart S150 Management Platform up to 20240101. It has been rated as critical. Affected by this issue is some unknown functionality of the file /useratte/userattestation.php of the component HTTP POST Request Handler. The manipulation of the argument web_img leads to unrestricted upload. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-249866 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.,6.3,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L,Byzoro Smart S150 Firmware CVE-2024-0301,A vulnerability classified as critical was found in fhs-opensource iparking 1.5.22.RELEASE. This vulnerability affects the function getData of the file src/main/java/com/xhb/pay/action/PayTempOrderAction.java. The manipulation leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-249868.,6.3,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L,N/A CVE-2024-0302,"A vulnerability, which was classified as critical, has been found in fhs-opensource iparking 1.5.22.RELEASE. This issue affects some unknown processing of the file /vueLogin. The manipulation leads to deserialization. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-249869 was assigned to this vulnerability.",6.3,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L,N/A CVE-2024-22216,"In default installations of Microchip maxView Storage Manager (for Adaptec Smart Storage Controllers) where Redfish server is configured for remote system management, unauthorized access can occur, with data modification and information disclosure. This affects 3.00.23484 through 4.14.00.26064 (except for the patched versions 3.07.23980 and 4.07.00.25339).",10.0,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H,N/A CVE-2024-0303,"A vulnerability, which was classified as critical, was found in Youke365 up to 1.5.3. Affected is an unknown function of the file /app/api/controller/caiji.php of the component Parameter Handler. The manipulation of the argument url leads to server-side request forgery. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-249870 is the identifier assigned to this vulnerability.",6.3,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L,N/A CVE-2024-0304,A vulnerability has been found in Youke365 up to 1.5.3 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /app/api/controller/collect.php. The manipulation of the argument url leads to server-side request forgery. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-249871.,6.3,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L,N/A CVE-2023-29048,"A component for parsing OXMF templates could be abused to execute arbitrary system commands that would be executed as the non-privileged runtime user. Users and attackers could run system commands with limited privilege to gain unauthorized access to confidential information and potentially violate integrity by modifying resources. The template engine has been reconfigured to deny execution of harmful commands on a system level. No publicly available exploits are known. ",8.8,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,N/A CVE-2023-29049,"The ""upsell"" widget at the portal page could be abused to inject arbitrary script code. Attackers that manage to lure users to a compromised account, or gain temporary access to a legitimate account, could inject script code to gain persistent code execution capabilities under a trusted domain. User input for this widget is now sanitized to avoid malicious content the be processed. No publicly available exploits are known. ",5.4,CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N,N/A CVE-2023-29050,"The optional ""LDAP contacts provider"" could be abused by privileged users to inject LDAP filter strings that allow to access content outside of the intended hierarchy. Unauthorized users could break confidentiality of information in the directory and potentially cause high load on the directory server, leading to denial of service. Encoding has been added for user-provided fragments that are used when constructing the LDAP query. No publicly available exploits are known. ",7.6,CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:L,N/A CVE-2023-29051,"User-defined OXMF templates could be used to access a limited part of the internal OX App Suite Java API. The existing switch to disable the feature by default was not effective in this case. Unauthorized users could discover and modify application state, including objects related to other users and contexts. We now make sure that the switch to disable user-generated templates by default works as intended and will remove the feature in future generations of the product. No publicly available exploits are known.",8.1,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N,N/A CVE-2023-29052,Users were able to define disclaimer texts for an upsell shop dialog that would contain script code that was not sanitized correctly. Attackers could lure victims to user accounts with malicious script code and make them execute it in the context of a trusted domain. We added sanitization for this content. No publicly available exploits are known.,5.4,CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N,N/A CVE-2023-41710,User-defined script code could be stored for a upsell related shop URL. This code was not correctly sanitized when adding it to DOM. Attackers could lure victims to user accounts with malicious script code and make them execute it in the context of a trusted domain. We added sanitization for this content. No publicly available exploits are known.,5.4,CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N,N/A CVE-2024-0305,A vulnerability was found in Guangzhou Yingke Electronic Technology Ncast up to 2017 and classified as problematic. Affected by this issue is some unknown functionality of the file /manage/IPSetup.php of the component Guest Login. The manipulation leads to information disclosure. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-249872.,5.3,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N,N/A CVE-2024-0306,A vulnerability was found in Kashipara Dynamic Lab Management System up to 1.0. It has been classified as critical. This affects an unknown part of the file /admin/admin_login_process.php. The manipulation of the argument admin_password leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-249873 was assigned to this vulnerability.,7.3,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L,N/A CVE-2023-5091,"Use After Free vulnerability in Arm Ltd Valhall GPU Kernel Driver allows a local non-privileged user to make improper GPU processing operations to gain access to already freed memory. This issue affects Valhall GPU Kernel Driver: from r37p0 through r40p0. ",5.5,CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N,N/A CVE-2024-0307,A vulnerability was found in Kashipara Dynamic Lab Management System up to 1.0. It has been declared as critical. This vulnerability affects unknown code of the file login_process.php. The manipulation of the argument password leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-249874 is the identifier assigned to this vulnerability.,7.3,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L,N/A CVE-2024-0308,A vulnerability was found in Inis up to 2.0.1. It has been rated as critical. This issue affects some unknown processing of the file app/api/controller/default/Proxy.php. The manipulation of the argument p_url leads to server-side request forgery. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-249875.,6.3,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L,N/A CVE-2023-6921,"Blind SQL Injection vulnerability in PrestaShow Google Integrator (PrestaShop addon) allows for data extraction and modification. This attack is possible via command insertion in one of the cookies. ",9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,N/A CVE-2023-6552,"Lack of ""current"" GET parameter validation during the action of changing a language leads to an open redirect vulnerability. ",6.1,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N,N/A CVE-2024-0321,Stack-based Buffer Overflow in GitHub repository gpac/gpac prior to 2.3-DEV.,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,N/A CVE-2024-0322,Out-of-bounds Read in GitHub repository gpac/gpac prior to 2.3-DEV.,9.1,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H,N/A CVE-2023-51701,"fastify-reply-from is a Fastify plugin to forward the current HTTP request to another server. A reverse proxy server built with `@fastify/reply-from` could misinterpret the incoming body by passing an header `ContentType: application/json ; charset=utf-8`. This can lead to bypass of security checks. This vulnerability has been patched in '@fastify/reply-from` version 9.6.0. ",5.3,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N,N/A CVE-2023-7224,OpenVPN Connect version 3.0 through 3.4.6 on macOS allows local users to execute code in external third party libraries using the DYLD_INSERT_LIBRARIES environment variable,7.8,CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,N/A CVE-2024-21644,"pyLoad is the free and open-source Download Manager written in pure Python. Any unauthenticated user can browse to a specific URL to expose the Flask config, including the `SECRET_KEY` variable. This issue has been patched in version 0.5.0b3.dev77.",7.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,N/A CVE-2024-21645,"pyLoad is the free and open-source Download Manager written in pure Python. A log injection vulnerability was identified in `pyload` allowing any unauthenticated actor to inject arbitrary messages into the logs gathered by `pyload`. Forged or otherwise, corrupted log files can be used to cover an attacker’s tracks or even to implicate another party in the commission of a malicious act. This vulnerability has been patched in version 0.5.0b3.dev77. ",5.3,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N,N/A CVE-2024-21647,"Puma is a web server for Ruby/Rack applications built for parallelism. Prior to version 6.4.2, puma exhibited incorrect behavior when parsing chunked transfer encoding bodies in a way that allowed HTTP request smuggling. Fixed versions limits the size of chunk extensions. Without this limit, an attacker could cause unbounded resource (CPU, network bandwidth) consumption. This vulnerability has been fixed in versions 6.4.2 and 5.6.8. ",5.9,CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H,N/A CVE-2023-32650,"An integer overflow vulnerability exists in the FST_BL_GEOM parsing maxhandle functionality of GTKWave 3.3.115, when compiled as a 32-bit binary. A specially crafted .fst file can lead to memory corruption. A victim would need to open a malicious file to trigger this vulnerability.",7.0,CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H,N/A CVE-2023-34087,An improper array index validation vulnerability exists in the EVCD var len parsing functionality of GTKWave 3.3.115. A specially crafted .evcd file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger this vulnerability.,7.8,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,N/A CVE-2023-34436,An out-of-bounds write vulnerability exists in the LXT2 num_time_table_entries functionality of GTKWave 3.3.115. A specially crafted .lxt2 file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger this vulnerability.,7.8,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,N/A CVE-2023-35004,An integer overflow vulnerability exists in the VZT longest_len value allocation functionality of GTKWave 3.3.115. A specially crafted .vzt file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger this vulnerability.,7.8,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,N/A CVE-2023-35057,An integer overflow vulnerability exists in the LXT2 lxt2_rd_trace value elements allocation functionality of GTKWave 3.3.115. A specially crafted .lxt2 file can lead to memory corruption. A victim would need to open a malicious file to trigger this vulnerability.,7.8,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,N/A CVE-2023-35128,An integer overflow vulnerability exists in the fstReaderIterBlocks2 time_table tsec_nitems functionality of GTKWave 3.3.115. A specially crafted .fst file can lead to memory corruption. A victim would need to open a malicious file to trigger this vulnerability.,7.0,CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H,N/A CVE-2023-35702,Multiple stack-based buffer overflow vulnerabilities exist in the FST LEB128 varint functionality of GTKWave 3.3.115. A specially crafted .fst file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns the fstReaderVarint32 function.,7.8,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,N/A CVE-2023-35703,Multiple stack-based buffer overflow vulnerabilities exist in the FST LEB128 varint functionality of GTKWave 3.3.115. A specially crafted .fst file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns the fstReaderVarint64 function.,7.8,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,N/A CVE-2023-35704,Multiple stack-based buffer overflow vulnerabilities exist in the FST LEB128 varint functionality of GTKWave 3.3.115. A specially crafted .fst file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns the fstReaderVarint32WithSkip function.,7.8,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,N/A CVE-2023-35955,Multiple heap-based buffer overflow vulnerabilities exist in the fstReaderIterBlocks2 VCDATA parsing functionality of GTKWave 3.3.115. A specially-crafted .fst file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns the decompression function `LZ4_decompress_safe_partial`.,7.8,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,N/A CVE-2023-35956,Multiple heap-based buffer overflow vulnerabilities exist in the fstReaderIterBlocks2 VCDATA parsing functionality of GTKWave 3.3.115. A specially-crafted .fst file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns the decompression function `fastlz_decompress`.,7.8,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,N/A CVE-2023-35957,Multiple heap-based buffer overflow vulnerabilities exist in the fstReaderIterBlocks2 VCDATA parsing functionality of GTKWave 3.3.115. A specially-crafted .fst file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns the decompression function `uncompress`.,7.8,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,N/A CVE-2023-35958,Multiple heap-based buffer overflow vulnerabilities exist in the fstReaderIterBlocks2 VCDATA parsing functionality of GTKWave 3.3.115. A specially-crafted .fst file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns the copy function `fstFread`.,7.8,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,N/A CVE-2023-35959,Multiple OS command injection vulnerabilities exist in the decompression functionality of GTKWave 3.3.115. A specially crafted wave file can lead to arbitrary command execution. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns `.ghw` decompression.,7.8,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,N/A CVE-2023-35960,Multiple OS command injection vulnerabilities exist in the decompression functionality of GTKWave 3.3.115. A specially crafted wave file can lead to arbitrary command execution. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns legacy decompression in `vcd_main`.,7.8,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,N/A CVE-2023-35961,Multiple OS command injection vulnerabilities exist in the decompression functionality of GTKWave 3.3.115. A specially crafted wave file can lead to arbitrary command execution. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns decompression in `vcd_recorder_main`.,7.8,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,N/A CVE-2023-35962,Multiple OS command injection vulnerabilities exist in the decompression functionality of GTKWave 3.3.115. A specially crafted wave file can lead to arbitrary command execution. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns decompression in the `vcd2vzt` utility.,7.8,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,N/A CVE-2023-35963,Multiple OS command injection vulnerabilities exist in the decompression functionality of GTKWave 3.3.115. A specially crafted wave file can lead to arbitrary command execution. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns decompression in the `vcd2lxt2` utility.,7.8,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,N/A CVE-2023-35964,Multiple OS command injection vulnerabilities exist in the decompression functionality of GTKWave 3.3.115. A specially crafted wave file can lead to arbitrary command execution. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns decompression in the `vcd2lxt` utility.,7.8,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,N/A CVE-2023-35969,Multiple heap-based buffer overflow vulnerabilities exist in the fstReaderIterBlocks2 chain_table parsing functionality of GTKWave 3.3.115. A specially crafted .fst file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns the chain_table of `FST_BL_VCDATA` and `FST_BL_VCDATA_DYN_ALIAS` section types.,7.8,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,N/A CVE-2023-35970,Multiple heap-based buffer overflow vulnerabilities exist in the fstReaderIterBlocks2 chain_table parsing functionality of GTKWave 3.3.115. A specially crafted .fst file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns the chain_table of the `FST_BL_VCDATA_DYN_ALIAS2` section type.,7.8,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,N/A CVE-2023-35989,An integer overflow vulnerability exists in the LXT2 zlib block allocation functionality of GTKWave 3.3.115. A specially crafted .lxt2 file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger this vulnerability.,7.8,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,N/A CVE-2023-35992,"An integer overflow vulnerability exists in the FST fstReaderIterBlocks2 vesc allocation functionality of GTKWave 3.3.115, when compiled as a 32-bit binary. A specially crafted .fst file can lead to memory corruption. A victim would need to open a malicious file to trigger this vulnerability.",7.0,CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H,N/A CVE-2023-35994,Multiple improper array index validation vulnerabilities exist in the fstReaderIterBlocks2 tdelta functionality of GTKWave 3.3.115. A specially crafted .fst file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns the tdelta initialization part.,7.8,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,N/A CVE-2023-35995,Multiple improper array index validation vulnerabilities exist in the fstReaderIterBlocks2 tdelta functionality of GTKWave 3.3.115. A specially crafted .fst file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns the tdelta indexing when signal_lens is 1.,7.8,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,N/A CVE-2023-35996,Multiple improper array index validation vulnerabilities exist in the fstReaderIterBlocks2 tdelta functionality of GTKWave 3.3.115. A specially crafted .fst file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns the tdelta indexing when signal_lens is 0.,7.8,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,N/A CVE-2023-35997,Multiple improper array index validation vulnerabilities exist in the fstReaderIterBlocks2 tdelta functionality of GTKWave 3.3.115. A specially crafted .fst file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns the tdelta indexing when signal_lens is 2 or more.,7.8,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,N/A CVE-2023-36746,Multiple heap-based buffer overflow vulnerabilities exist in the fstReaderIterBlocks2 fstWritex len functionality of GTKWave 3.3.115. A specially crafted .fst file can lead to memory corruption. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns the handling of `len` in `fstWritex` when parsing the time table.,7.0,CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H,N/A CVE-2023-36747,Multiple heap-based buffer overflow vulnerabilities exist in the fstReaderIterBlocks2 fstWritex len functionality of GTKWave 3.3.115. A specially crafted .fst file can lead to memory corruption. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns the handling of `len` in `fstWritex` when `beg_time` does not match the start of the time table.,7.0,CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H,N/A CVE-2023-36861,An out-of-bounds write vulnerability exists in the VZT LZMA_read_varint functionality of GTKWave 3.3.115. A specially crafted .vzt file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger this vulnerability.,7.8,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,N/A CVE-2023-36864,An integer overflow vulnerability exists in the fstReaderIterBlocks2 temp_signal_value_buf allocation functionality of GTKWave 3.3.115. A specially crafted .fst file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger this vulnerability.,7.8,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,N/A CVE-2023-36915,Multiple integer overflow vulnerabilities exist in the FST fstReaderIterBlocks2 chain_table allocation functionality of GTKWave 3.3.115. A specially crafted .fst file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns the allocation of the `chain_table` array.,7.8,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,N/A CVE-2023-36916,Multiple integer overflow vulnerabilities exist in the FST fstReaderIterBlocks2 chain_table allocation functionality of GTKWave 3.3.115. A specially crafted .fst file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns the allocation of the `chain_table_lengths` array.,7.8,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,N/A CVE-2023-37282,An out-of-bounds write vulnerability exists in the VZT LZMA_Read dmem extraction functionality of GTKWave 3.3.115. A specially crafted .vzt file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger this vulnerability.,7.8,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,N/A CVE-2023-37416,Multiple out-of-bounds write vulnerabilities exist in the VCD parse_valuechange portdump functionality of GTKWave 3.3.115. A specially crafted .vcd file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns the out-of-bounds write when triggered via the GUI's legacy VCD parsing code.,7.8,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,N/A CVE-2023-37417,Multiple out-of-bounds write vulnerabilities exist in the VCD parse_valuechange portdump functionality of GTKWave 3.3.115. A specially crafted .vcd file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns the out-of-bounds write when triggered via the GUI's interactive VCD parsing code.,7.8,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,N/A CVE-2023-37418,Multiple out-of-bounds write vulnerabilities exist in the VCD parse_valuechange portdump functionality of GTKWave 3.3.115. A specially crafted .vcd file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns the out-of-bounds write when triggered via the vcd2vzt conversion utility.,7.8,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,N/A CVE-2023-37419,Multiple out-of-bounds write vulnerabilities exist in the VCD parse_valuechange portdump functionality of GTKWave 3.3.115. A specially crafted .vcd file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns the out-of-bounds write when triggered via the vcd2lxt2 conversion utility.,7.8,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,N/A CVE-2023-37420,Multiple out-of-bounds write vulnerabilities exist in the VCD parse_valuechange portdump functionality of GTKWave 3.3.115. A specially crafted .vcd file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns the out-of-bounds write when triggered via the vcd2lxt conversion utility.,7.8,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,N/A CVE-2023-37442,Multiple out-of-bounds read vulnerabilities exist in the VCD var definition section functionality of GTKWave 3.3.115. A specially crafted .vcd file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns the out-of-bounds read when triggered via the GUI's default VCD parsing code.,7.8,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,N/A CVE-2023-37443,Multiple out-of-bounds read vulnerabilities exist in the VCD var definition section functionality of GTKWave 3.3.115. A specially crafted .vcd file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns the out-of-bounds read when triggered via the GUI's legacy VCD parsing code.,7.8,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,N/A CVE-2023-37444,Multiple out-of-bounds read vulnerabilities exist in the VCD var definition section functionality of GTKWave 3.3.115. A specially crafted .vcd file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns the out-of-bounds read when triggered via the GUI's interactive VCD parsing code.,7.8,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,N/A CVE-2023-37445,Multiple out-of-bounds read vulnerabilities exist in the VCD var definition section functionality of GTKWave 3.3.115. A specially crafted .vcd file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns the out-of-bounds write when triggered via the vcd2vzt conversion utility.,7.8,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,N/A CVE-2023-37446,Multiple out-of-bounds read vulnerabilities exist in the VCD var definition section functionality of GTKWave 3.3.115. A specially crafted .vcd file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns the out-of-bounds write when triggered via the vcd2lxt2 conversion utility.,7.8,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,N/A CVE-2023-37447,Multiple out-of-bounds read vulnerabilities exist in the VCD var definition section functionality of GTKWave 3.3.115. A specially crafted .vcd file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns the out-of-bounds write when triggered via the vcd2lxt conversion utility.,7.8,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,N/A CVE-2023-37573,Multiple use-after-free vulnerabilities exist in the VCD get_vartoken realloc functionality of GTKWave 3.3.115. A specially crafted .vcd file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns the use-after-free when triggered via the GUI's recoder (default) VCD parsing code.,7.8,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,N/A CVE-2023-37574,Multiple use-after-free vulnerabilities exist in the VCD get_vartoken realloc functionality of GTKWave 3.3.115. A specially crafted .vcd file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns the use-after-free when triggered via the GUI's legacy VCD parsing code.,7.8,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,N/A CVE-2023-37575,Multiple use-after-free vulnerabilities exist in the VCD get_vartoken realloc functionality of GTKWave 3.3.115. A specially crafted .vcd file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns the use-after-free when triggered via the GUI's interactive VCD parsing code.,7.8,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,N/A CVE-2023-37576,Multiple use-after-free vulnerabilities exist in the VCD get_vartoken realloc functionality of GTKWave 3.3.115. A specially crafted .vcd file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns the use-after-free when triggered via the vcd2vzt conversion utility.,7.8,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,N/A CVE-2023-37577,Multiple use-after-free vulnerabilities exist in the VCD get_vartoken realloc functionality of GTKWave 3.3.115. A specially crafted .vcd file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns the use-after-free when triggered via the vcd2lxt2 conversion utility.,7.8,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,N/A CVE-2023-37578,Multiple use-after-free vulnerabilities exist in the VCD get_vartoken realloc functionality of GTKWave 3.3.115. A specially crafted .vcd file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns the use-after-free when triggered via the vcd2lxt conversion utility.,7.8,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,N/A CVE-2023-37921,Multiple arbitrary write vulnerabilities exist in the VCD sorted bsearch functionality of GTKWave 3.3.115. A specially crafted .vcd file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns the arbitrary write when triggered via the vcd2vzt conversion utility.,7.8,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,N/A CVE-2023-37922,Multiple arbitrary write vulnerabilities exist in the VCD sorted bsearch functionality of GTKWave 3.3.115. A specially crafted .vcd file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns the arbitrary write when triggered via the vcd2lxt2 conversion utility.,7.8,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,N/A CVE-2023-37923,Multiple arbitrary write vulnerabilities exist in the VCD sorted bsearch functionality of GTKWave 3.3.115. A specially crafted .vcd file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns the arbitrary write when triggered via the vcd2lxt conversion utility.,7.8,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,N/A CVE-2023-38583,A stack-based buffer overflow vulnerability exists in the LXT2 lxt2_rd_expand_integer_to_bits function of GTKWave 3.3.115. A specially crafted .lxt2 file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger this vulnerability.,7.8,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,N/A CVE-2023-38618,Multiple integer overflow vulnerabilities exist in the VZT facgeometry parsing functionality of GTKWave 3.3.115. A specially crafted .vzt file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns the integer overflow when allocating the `rows` array.,7.8,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,N/A CVE-2023-38619,Multiple integer overflow vulnerabilities exist in the VZT facgeometry parsing functionality of GTKWave 3.3.115. A specially crafted .vzt file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns the integer overflow when allocating the `msb` array.,7.8,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,N/A CVE-2023-38620,Multiple integer overflow vulnerabilities exist in the VZT facgeometry parsing functionality of GTKWave 3.3.115. A specially crafted .vzt file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns the integer overflow when allocating the `lsb` array.,7.8,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,N/A CVE-2023-38621,Multiple integer overflow vulnerabilities exist in the VZT facgeometry parsing functionality of GTKWave 3.3.115. A specially crafted .vzt file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns the integer overflow when allocating the `flags` array.,7.8,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,N/A CVE-2023-38622,Multiple integer overflow vulnerabilities exist in the VZT facgeometry parsing functionality of GTKWave 3.3.115. A specially crafted .vzt file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns the integer overflow when allocating the `len` array.,7.8,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,N/A CVE-2023-38623,Multiple integer overflow vulnerabilities exist in the VZT facgeometry parsing functionality of GTKWave 3.3.115. A specially crafted .vzt file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns the integer overflow when allocating the `vindex_offset` array.,7.8,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,N/A CVE-2023-38648,Multiple out-of-bounds write vulnerabilities exist in the VZT vzt_rd_get_facname decompression functionality of GTKWave 3.3.115. A specially crafted .vzt file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns the out-of-bounds write perfomed by the prefix copy loop.,7.8,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,N/A CVE-2023-38649,Multiple out-of-bounds write vulnerabilities exist in the VZT vzt_rd_get_facname decompression functionality of GTKWave 3.3.115. A specially crafted .vzt file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns the out-of-bounds write perfomed by the string copy loop.,7.8,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,N/A CVE-2023-38650,Multiple integer overflow vulnerabilities exist in the VZT vzt_rd_block_vch_decode times parsing functionality of GTKWave 3.3.115. A specially crafted .vzt file can lead to memory corruption. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns the integer overflow when num_time_ticks is not zero.,7.0,CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H,N/A CVE-2023-38651,Multiple integer overflow vulnerabilities exist in the VZT vzt_rd_block_vch_decode times parsing functionality of GTKWave 3.3.115. A specially crafted .vzt file can lead to memory corruption. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns the integer overflow when num_time_ticks is zero.,7.0,CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H,N/A CVE-2023-38652,Multiple integer overflow vulnerabilities exist in the VZT vzt_rd_block_vch_decode dict parsing functionality of GTKWave 3.3.115. A specially crafted .vzt file can lead to memory corruption. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns the integer overflow when num_time_ticks is not zero.,7.0,CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H,N/A CVE-2023-38653,Multiple integer overflow vulnerabilities exist in the VZT vzt_rd_block_vch_decode dict parsing functionality of GTKWave 3.3.115. A specially crafted .vzt file can lead to memory corruption. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns the integer overflow when num_time_ticks is zero.,7.0,CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H,N/A CVE-2023-38657,An out-of-bounds write vulnerability exists in the LXT2 zlib block decompression functionality of GTKWave 3.3.115. A specially crafted .lxt2 file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger this vulnerability.,7.8,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,N/A CVE-2023-39234,Multiple out-of-bounds write vulnerabilities exist in the VZT vzt_rd_process_block autosort functionality of GTKWave 3.3.115. A specially crafted .vzt file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns the out-of-bounds write when looping over `lt->numrealfacs`.,7.8,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,N/A CVE-2023-39235,Multiple out-of-bounds write vulnerabilities exist in the VZT vzt_rd_process_block autosort functionality of GTKWave 3.3.115. A specially crafted .vzt file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns the out-of-bounds write when looping over `lt->num_time_ticks`.,7.8,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,N/A CVE-2023-39270,Multiple integer overflow vulnerabilities exist in the LXT2 facgeometry parsing functionality of GTKWave 3.3.115. A specially crafted .lxt2 file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns the integer overflow when allocating the `rows` array.,7.8,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,N/A CVE-2023-39271,Multiple integer overflow vulnerabilities exist in the LXT2 facgeometry parsing functionality of GTKWave 3.3.115. A specially crafted .lxt2 file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns the integer overflow when allocating the `msb` array.,7.8,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,N/A CVE-2023-39272,Multiple integer overflow vulnerabilities exist in the LXT2 facgeometry parsing functionality of GTKWave 3.3.115. A specially crafted .lxt2 file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns the integer overflow when allocating the `lsb` array.,7.8,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,N/A CVE-2023-39273,Multiple integer overflow vulnerabilities exist in the LXT2 facgeometry parsing functionality of GTKWave 3.3.115. A specially crafted .lxt2 file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns the integer overflow when allocating the `flags` array.,7.8,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,N/A CVE-2023-39274,Multiple integer overflow vulnerabilities exist in the LXT2 facgeometry parsing functionality of GTKWave 3.3.115. A specially crafted .lxt2 file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns the integer overflow when allocating the `len` array.,7.8,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,N/A CVE-2023-39275,Multiple integer overflow vulnerabilities exist in the LXT2 facgeometry parsing functionality of GTKWave 3.3.115. A specially crafted .lxt2 file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns the integer overflow when allocating the `value` array.,7.8,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,N/A CVE-2023-39316,Multiple integer overflow vulnerabilities exist in the LXT2 num_dict_entries functionality of GTKWave 3.3.115. A specially crafted .lxt2 file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns the integer overflow when allocating the `string_pointers` array.,7.8,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,N/A CVE-2023-39317,Multiple integer overflow vulnerabilities exist in the LXT2 num_dict_entries functionality of GTKWave 3.3.115. A specially crafted .lxt2 file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns the integer overflow when allocating the `string_lens` array.,7.8,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,N/A CVE-2023-39413,Multiple integer underflow vulnerabilities exist in the LXT2 lxt2_rd_iter_radix shift operation functionality of GTKWave 3.3.115. A specially crafted .lxt2 file can lead to memory corruption. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns the integer underflow when performing the left shift operation.,7.0,CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H,N/A CVE-2023-39414,Multiple integer underflow vulnerabilities exist in the LXT2 lxt2_rd_iter_radix shift operation functionality of GTKWave 3.3.115. A specially crafted .lxt2 file can lead to memory corruption. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns the integer underflow when performing the right shift operation.,7.0,CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H,N/A CVE-2023-39443,Multiple out-of-bounds write vulnerabilities exist in the LXT2 parsing functionality of GTKWave 3.3.115. A specially-crafted .lxt2 file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns the out-of-bounds write perfomed by the prefix copy loop.,7.8,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,N/A CVE-2023-39444,Multiple out-of-bounds write vulnerabilities exist in the LXT2 parsing functionality of GTKWave 3.3.115. A specially-crafted .lxt2 file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns the out-of-bounds write perfomed by the string copy loop.,7.8,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,N/A CVE-2023-47211,A directory traversal vulnerability exists in the uploadMib functionality of ManageEngine OpManager 12.7.258. A specially crafted HTTP request can lead to arbitrary file creation. An attacker can send a malicious MiB file to trigger this vulnerability.,9.1,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:L,N/A CVE-2024-21650,"XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. XWiki is vulnerable to a remote code execution (RCE) attack through its user registration feature. This issue allows an attacker to execute arbitrary code by crafting malicious payloads in the ""first name"" or ""last name"" fields during user registration. This impacts all installations that have user registration enabled for guests. This vulnerability has been patched in XWiki 14.10.17, 15.5.3 and 15.8 RC1.",10.0,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H,N/A CVE-2024-21744,"Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Mapster Technology Inc. Mapster WP Maps allows Stored XSS.This issue affects Mapster WP Maps: from n/a through 1.2.38. ",6.5,CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L,N/A CVE-2024-21745,"Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Laybuy Laybuy Payment Extension for WooCommerce allows Stored XSS.This issue affects Laybuy Payment Extension for WooCommerce: from n/a through 5.3.9. ",6.5,CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L,N/A CVE-2024-21747,"Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in weDevs WP ERP | Complete HR solution with recruitment & job listings | WooCommerce CRM & Accounting.This issue affects WP ERP | Complete HR solution with recruitment & job listings | WooCommerce CRM & Accounting: from n/a through 1.12.8. ",7.6,CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:L,N/A CVE-2022-2585,"It was discovered that when exec'ing from a non-leader thread, armed POSIX CPU timers would be left on a list but freed, leading to a use-after-free.",5.3,CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H,"Canonical Ubuntu Linux 22.04, Canonical Ubuntu Linux 20.04, Linux Linux Kernel" CVE-2022-2586,"It was discovered that a nft object or expression could reference a nft set on a different nft table, leading to a use-after-free once that table was deleted.",5.3,CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H,"Canonical Ubuntu Linux 14.04, Canonical Ubuntu Linux 22.04, Canonical Ubuntu Linux 18.04, Canonical Ubuntu Linux 20.04, Linux Linux Kernel 6.0, Canonical Ubuntu Linux 16.04, Linux Linux Kernel" CVE-2022-2588,It was discovered that the cls_route filter implementation in the Linux kernel would not remove an old filter from the hashtable before freeing it if its handle had the value 0.,5.3,CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H,"Canonical Ubuntu Linux 14.04, Canonical Ubuntu Linux 22.04, Canonical Ubuntu Linux 20.04, Canonical Ubuntu Linux 18.04, Canonical Ubuntu Linux 16.04, Linux Linux Kernel" CVE-2022-2602,"io_uring UAF, Unix SCM garbage collection",5.3,CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H,"Canonical Ubuntu Linux 22.10, Canonical Ubuntu Linux 22.04, Canonical Ubuntu Linux 20.04, Canonical Ubuntu Linux 18.04, Linux Linux Kernel" CVE-2022-3328,Race condition in snap-confine's must_mkdir_and_open_with_perms(),7.8,CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H,"Canonical Ubuntu Linux 22.10, Canonical Ubuntu Linux 22.04, Canonical Ubuntu Linux 18.04, Canonical Ubuntu Linux 20.04, Canonical Ubuntu Linux 16.04" CVE-2023-52215,"Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in UkrSolution Simple Inventory Management – just scan barcode to manage products and orders. For WooCommerce.This issue affects Simple Inventory Management – just scan barcode to manage products and orders. For WooCommerce: from n/a through 1.5.1. ",9.3,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:L,N/A CVE-2023-52218,"Deserialization of Untrusted Data vulnerability in Anton Bond Woocommerce Tranzila Payment Gateway.This issue affects Woocommerce Tranzila Payment Gateway: from n/a through 1.0.8. ",10.0,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H,N/A CVE-2023-52219,"Deserialization of Untrusted Data vulnerability in Gecka Gecka Terms Thumbnails.This issue affects Gecka Terms Thumbnails: from n/a through 1.1. ",9.9,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H,N/A CVE-2023-52225,"Deserialization of Untrusted Data vulnerability in Tagbox Tagbox – UGC Galleries, Social Media Widgets, User Reviews & Analytics.This issue affects Tagbox – UGC Galleries, Social Media Widgets, User Reviews & Analytics: from n/a through 3.1. ",10.0,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H,N/A CVE-2018-25095,"The Duplicator WordPress plugin before 1.3.0 does not properly escape values when its installer script replaces values in WordPress configuration files. If this installer script is left on the site after use, it could be use to run arbitrary code on the server.",9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,N/A CVE-2021-3600,It was discovered that the eBPF implementation in the Linux kernel did not properly track bounds information for 32 bit registers when performing div and mod operations. A local attacker could use this to possibly execute arbitrary code.,7.8,CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H,"Canonical Ubuntu Linux 14.04, Canonical Ubuntu Linux 18.04, Linux Linux Kernel 5.11, Canonical Ubuntu Linux 16.04, Linux Linux Kernel, Redhat Enterprise Linux 8.0, Fedoraproject Fedora 34" CVE-2023-1032,The Linux kernel io_uring IORING_OP_SOCKET operation contained a double free in function __sys_socket_file() in file net/socket.c. This issue was introduced in da214a475f8bd1d3e9e7a19ddfeb4d1617551bab and fixed in 649c15c7691e9b13cbe9bf6c65c365350e056067.,4.7,CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H,"Canonical Ubuntu Linux 22.04, Linux Linux Kernel 6.3, Canonical Ubuntu Linux 22.10, Linux Linux Kernel" CVE-2023-52190,"Exposure of Sensitive Information to an Unauthorized Actor vulnerability in WP Swings Coupon Referral Program.This issue affects Coupon Referral Program: from n/a through 1.7.2. ",7.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,N/A CVE-2023-52207,"Deserialization of Untrusted Data vulnerability in SVNLabs Softwares HTML5 MP3 Player with Playlist Free.This issue affects HTML5 MP3 Player with Playlist Free: from n/a through 3.0.0. ",9.1,CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H,N/A CVE-2023-52208,"Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Constant Contact Constant Contact Forms.This issue affects Constant Contact Forms: from n/a through 2.4.2. ",5.3,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N,N/A CVE-2023-52222,"Cross-Site Request Forgery (CSRF) vulnerability in Automattic WooCommerce.This issue affects WooCommerce: from n/a through 8.2.2. ",4.3,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N,N/A CVE-2023-5235,"The Ovic Responsive WPBakery WordPress plugin before 1.2.9 does not limit which options can be updated via some of its AJAX actions, which may allow attackers with a subscriber+ account to update blog options, such as 'users_can_register' and 'default_role'. It also unserializes user input in the process, which may lead to Object Injection attacks.",8.8,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,N/A CVE-2023-5911,"The WP Custom Cursors | WordPress Cursor Plugin WordPress plugin through 3.2 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)",4.8,CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N,N/A CVE-2023-5957,"The Ni Purchase Order(PO) For WooCommerce WordPress plugin through 1.2.1 does not validate logo and signature image files uploaded in the settings, allowing high privileged user to upload arbitrary files to the web server, triggering an RCE vulnerability by uploading a web shell.",7.2,CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H,N/A CVE-2023-6042,Any unauthenticated user may send e-mail from the site with any title or content to the admin,7.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N,N/A CVE-2023-6139,"The Essential Real Estate WordPress plugin before 4.4.0 does not apply proper capability checks on its AJAX actions, which among other things, allow attackers with a subscriber account to conduct Denial of Service attacks.",6.5,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H,N/A CVE-2023-6140,"The Essential Real Estate WordPress plugin before 4.4.0 does not prevent users with limited privileges on the site, like subscribers, from momentarily uploading malicious PHP files disguised as ZIP archives, which may lead to remote code execution.",8.8,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,N/A CVE-2023-6141,"The Essential Real Estate WordPress plugin before 4.4.0 does not apply proper capability checks on its AJAX actions, which among other things, allow attackers with a subscriber account to conduct Stored XSS attacks.",5.4,CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N,N/A CVE-2023-6161,"The WP Crowdfunding WordPress plugin before 2.1.9 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin",6.1,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N,N/A CVE-2023-6383,"The Debug Log Manager WordPress plugin before 2.3.0 contains a Directory listing vulnerability was discovered, which allows you to download the debug log without authorization and gain access to sensitive data",7.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,N/A CVE-2023-6505,The Migrate WordPress Website & Backups WordPress plugin before 1.9.3 does not prevent directory listing in sensitive directories containing export files.,7.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,N/A CVE-2023-6528,"The Slider Revolution WordPress plugin before 6.6.19 does not prevent users with at least the Author role from unserializing arbitrary content when importing sliders, potentially leading to Remote Code Execution.",8.8,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,N/A CVE-2023-6529,"The WP VR WordPress plugin before 8.3.15 does not authorisation and CSRF in a function hooked to admin_init, allowing unauthenticated users to downgrade the plugin, thus leading to Reflected or Stored XSS, as previous versions have such vulnerabilities.",6.1,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N,N/A CVE-2023-6532,"The WP Blogs' Planetarium WordPress plugin through 1.0 does not have CSRF check in place when updating its settings, which could allow attackers to make a logged in admin change them via a CSRF attack",8.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,N/A CVE-2023-6555,"The Email Subscription Popup WordPress plugin before 1.2.20 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin",6.1,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N,N/A CVE-2023-6627,"The WP Go Maps (formerly WP Google Maps) WordPress plugin before 9.0.28 does not properly protect most of its REST API routes, which attackers can abuse to store malicious HTML/Javascript on the site.",6.1,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N,N/A CVE-2023-6631,"PowerSYSTEM Center versions 2020 Update 16 and prior contain a vulnerability that may allow an authorized local user to insert arbitrary code into the unquoted service path and escalate privileges. ",7.8,CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,N/A CVE-2023-6750,"The Clone WordPress plugin before 2.4.3 uses buffer files to store in-progress backup informations, which is stored at a publicly accessible, statically defined file path.",7.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,N/A CVE-2023-6845,"The CommentTweets WordPress plugin through 0.6 does not have CSRF checks in some places, which could allow attackers to make logged in users perform unwanted actions via CSRF attacks",8.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,N/A CVE-2023-47890,pyLoad 0.5.0 is vulnerable to Unrestricted File Upload.,8.8,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,N/A CVE-2023-50982,"Stud.IP 5.x through 5.3.3 allows XSS with resultant upload of executable files, because upload_action and edit_action in Admin_SmileysController do not check the file extension. This leads to remote code execution with the privileges of the www-data user. The fixed versions are 5.3.4, 5.2.6, 5.1.7, and 5.0.9.",9.0,CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H,N/A CVE-2023-51246,A Cross Site Scripting (XSS) vulnerability in GetSimple CMS 3.3.16 exists when using Source Code Mode as a backend user to add articles via the /admin/edit.php page.,5.4,CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N,N/A CVE-2023-52200,"Cross-Site Request Forgery (CSRF), Deserialization of Untrusted Data vulnerability in Repute Infosystems ARMember – Membership Plugin, Content Restriction, Member Levels, User Profile & User signup.This issue affects ARMember – Membership Plugin, Content Restriction, Member Levels, User Profile & User signup: n/a. ",9.6,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H,N/A CVE-2023-52203,"Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Oliver Seidel, Bastian Germann cformsII allows Stored XSS.This issue affects cformsII: from n/a through 15.0.5. ",5.9,CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L,N/A CVE-2023-52204,"Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Javik Randomize.This issue affects Randomize: from n/a through 1.4.3. ",8.5,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:L,N/A CVE-2023-52205,"Deserialization of Untrusted Data vulnerability in SVNLabs Softwares HTML5 SoundCloud Player with Playlist Free.This issue affects HTML5 SoundCloud Player with Playlist Free: from n/a through 2.8.0. ",9.1,CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H,N/A CVE-2023-52206,"Deserialization of Untrusted Data vulnerability in Live Composer Team Page Builder: Live Composer live-composer-page-builder.This issue affects Page Builder: Live Composer: from n/a through 1.5.25. ",7.7,CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:N,N/A CVE-2023-52213,"Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in VideoWhisper Rate Star Review – AJAX Reviews for Content, with Star Ratings allows Reflected XSS.This issue affects Rate Star Review – AJAX Reviews for Content, with Star Ratings: from n/a through 1.5.1. ",7.1,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L,N/A CVE-2023-52216,"Cross-Site Request Forgery (CSRF) vulnerability in Yevhen Kotelnytskyi JS & CSS Script Optimizer.This issue affects JS & CSS Script Optimizer: from n/a through 0.3.3. ",4.3,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N,N/A CVE-2023-52271,The wsftprm.sys kernel driver 2.0.0.0 in Topaz Antifraud allows low-privileged attackers to kill any (Protected Process Light) process via an IOCTL (which will be named at a later time).,6.5,CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H,N/A CVE-2022-45354,"Exposure of Sensitive Information to an Unauthorized Actor vulnerability in WPChill Download Monitor.This issue affects Download Monitor: from n/a through 4.7.60. ",5.3,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N,N/A CVE-2023-27739,easyXDM 2.5 allows XSS via the xdm_e parameter.,6.1,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N,N/A CVE-2023-49961,"WALLIX Bastion 7.x, 8.x, 9.x and 10.x and WALLIX Access Manager 3.x and 4.x have Incorrect Access Control which can lead to sensitive data exposure.",7.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,N/A CVE-2023-51406,"Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Ninja Team FastDup – Fastest WordPress Migration & Duplicator.This issue affects FastDup – Fastest WordPress Migration & Duplicator: from n/a through 2.1.7. ",5.3,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N,N/A CVE-2023-51408,"Exposure of Sensitive Information to an Unauthorized Actor vulnerability in StudioWombat WP Optin Wheel – Gamified Optin Email Marketing Tool for WordPress and WooCommerce.This issue affects WP Optin Wheel – Gamified Optin Email Marketing Tool for WordPress and WooCommerce: from n/a through 1.4.3. ",5.3,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N,N/A CVE-2023-51490,"Exposure of Sensitive Information to an Unauthorized Actor vulnerability in WPMU DEV Defender Security – Malware Scanner, Login Security & Firewall.This issue affects Defender Security – Malware Scanner, Login Security & Firewall: from n/a through 4.1.0. ",5.3,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N,N/A CVE-2023-51508,"Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Jordy Meow Database Cleaner: Clean, Optimize & Repair.This issue affects Database Cleaner: Clean, Optimize & Repair: from n/a through 0.9.8. ",5.3,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N,N/A CVE-2023-52142,"Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Cool Plugins Events Shortcodes For The Events Calendar.This issue affects Events Shortcodes For The Events Calendar: from n/a through 2.3.1. ",7.6,CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:L,N/A CVE-2023-52196,"Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Phil Ewels CPT Bootstrap Carousel allows Reflected XSS.This issue affects CPT Bootstrap Carousel: from n/a through 1.12. ",7.1,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L,N/A CVE-2023-52197,"Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Impactpixel Ads Invalid Click Protection allows Stored XSS.This issue affects Ads Invalid Click Protection: from n/a through 1.0. ",5.9,CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L,N/A CVE-2023-52198,"Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Michiel van Eerd Private Google Calendars allows Stored XSS.This issue affects Private Google Calendars: from n/a through 20231125. ",6.5,CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L,N/A CVE-2023-52201,"Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Brian D. Goad pTypeConverter.This issue affects pTypeConverter: from n/a through 0.2.8.1. ",7.6,CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:L,N/A CVE-2023-52202,"Deserialization of Untrusted Data vulnerability in SVNLabs Softwares HTML5 MP3 Player with Folder Feedburner Playlist Free.This issue affects HTML5 MP3 Player with Folder Feedburner Playlist Free: from n/a through 2.8.0. ",9.1,CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H,N/A CVE-2023-7218,"A vulnerability, which was classified as critical, was found in Totolink N350RT 9.3.5u.6139_B202012. Affected is the function loginAuth of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument password leads to stack-based buffer overflow. It is possible to launch the attack remotely. The identifier of this vulnerability is VDB-249852. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.",7.2,CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H,Totolink N350Rt Firmware 9.3.5u.6139_b20201216 CVE-2022-34344,"Missing Authorization vulnerability in Rymera Web Co Wholesale Suite – WooCommerce Wholesale Prices, B2B, Catalog Mode, Order Form, Wholesale User Roles, Dynamic Pricing & More.This issue affects Wholesale Suite – WooCommerce Wholesale Prices, B2B, Catalog Mode, Order Form, Wholesale User Roles, Dynamic Pricing & More: from n/a through 2.1.5. ",5.4,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L,N/A CVE-2022-36352,"Missing Authorization vulnerability in Profilegrid ProfileGrid – User Profiles, Memberships, Groups and Communities.This issue affects ProfileGrid – User Profiles, Memberships, Groups and Communities: from n/a through 5.0.3. ",6.3,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L,N/A CVE-2022-40696,"Exposure of Sensitive Information to an Unauthorized Actor vulnerability in WP Engine Advanced Custom Fields (ACF).This issue affects Advanced Custom Fields (ACF): from 3.1.1 through 6.0.2. ",3.7,CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N,N/A CVE-2023-52072,FlyCms v1.0 was discovered to contain a Cross-Site Request Forgery (CSRF) via the component /system/site/userconfig_updagte.,8.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,N/A CVE-2023-52073,FlyCms v1.0 was discovered to contain a Cross-Site Request Forgery (CSRF) via the component /system/site/config_footer_updagte.,8.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,N/A CVE-2023-52074,FlyCms v1.0 was discovered to contain a Cross-Site Request Forgery (CSRF) via the component system/site/webconfig_updagte.,8.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,N/A CVE-2023-50162,"SQL injection vulnerability in EmpireCMS v7.5, allows remote attackers to execute arbitrary code and obtain sensitive information via the DoExecSql function.",7.2,CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H,N/A CVE-2024-21648,"XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. The rollback action is missing a right protection, a user can rollback to a previous version of the page to gain rights they don't have anymore. The problem has been patched in XWiki 14.10.17, 15.5.3 and 15.8-rc-1 by ensuring that the rights are checked before performing the rollback. ",8.0,CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H,N/A CVE-2024-21651,"XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. A user able to attach a file to a page can post a malformed TAR file by manipulating file modification times headers, which when parsed by Tika, could cause a denial of service issue via CPU consumption. This vulnerability has been patched in XWiki 14.10.18, 15.5.3 and 15.8 RC1. ",7.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,N/A CVE-2024-21663,"Discord-Recon is a Discord bot created to automate bug bounty recon, automated scans and information gathering via a discord server. Discord-Recon is vulnerable to remote code execution. An attacker is able to execute shell commands in the server without having an admin role. This vulnerability has been fixed in version 0.0.8. ",9.9,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H,N/A CVE-2023-46906,"juzaweb <= 3.4 is vulnerable to Incorrect Access Control, resulting in an application outage after a 500 HTTP status code. The payload in the timezone field was not correctly validated.",4.9,CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H,N/A CVE-2023-50643,An issue in Evernote Evernote for MacOS v.10.68.2 allows a remote attacker to execute arbitrary code via the RunAsNode and enableNodeClilnspectArguments components.,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,N/A CVE-2024-21646,"Azure uAMQP is a general purpose C library for AMQP 1.0. The UAMQP library is used by several clients to implement AMQP protocol communication. When clients using this library receive a crafted binary type data, an integer overflow or wraparound or memory safety issue can occur and may cause remote code execution. This vulnerability has been patched in release 2024-01-01.",9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,N/A CVE-2024-21734,"SAP Marketing (Contacts App) - version 160, allows an attacker with low privileges to trick a user to open malicious page which could lead to a very convincing phishing attack with low impact on confidentiality and integrity of the application. ",3.7,CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:N,N/A CVE-2024-21735,"SAP LT Replication Server - version S4CORE 103, S4CORE 104, S4CORE 105, S4CORE 106, S4CORE 107, S4CORE 108, does not perform necessary authorization checks. This could allow an attacker with high privileges to perform unintended actions, resulting in escalation of privileges, which has High impact on confidentiality, integrity and availability of the system. ",7.3,CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H,N/A CVE-2023-26998,Cross Site Scripting vulnerability found in NetScoutnGeniusOne v.6.3.4 allows a remote attacker to execute arbitrary code via the creator parameter of the Alert Configuration page.,5.4,CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N,N/A CVE-2023-26999,An issue found in NetScout nGeniusOne v.6.3.4 allows a remote attacker to execute arbitrary code and cause a denial of service via a crafted file.,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,N/A CVE-2023-27000,Cross Site Scripting vulnerability found in NetScoutnGeniusOne v.6.3.4 allows a remote attacker to execute arbitrary code via the name parameter of the Profile and Exclusion List page(s).,6.1,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N,N/A CVE-2023-27098,TP-Link Tapo APK up to v2.12.703 uses hardcoded credentials for access to the login panel.,7.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,N/A CVE-2023-36629,The ST ST54-android-packages-apps-Nfc package before 130-20230215-23W07p0 for Android has an out-of-bounds read.,5.5,CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N,N/A CVE-2023-39336,"An unspecified SQL Injection vulnerability in Ivanti Endpoint Manager released prior to 2022 SU 5 allows an attacker with access to the internal network to execute arbitrary SQL queries and retrieve output without the need for authentication. Under specific circumstances, this may also lead to RCE on the core server. ",8.8,CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,N/A CVE-2023-49238,"In Gradle Enterprise before 2023.1, a remote attacker may be able to gain access to a new installation (in certain installation scenarios) because of a non-unique initial system user password. Although this password must be changed upon the first login, it is possible that an attacker logs in before the legitimate administrator logs in.",9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,N/A CVE-2023-51717,Dataiku DSS before 11.4.5 and 12.4.1 has Incorrect Access Control that could lead to a full authentication bypass.,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,N/A CVE-2024-21736,"SAP S/4HANA Finance for (Advanced Payment Management) - versions SAPSCORE 128, S4CORE 107, does not perform necessary authorization checks. A function import could be triggered allowing the attacker to create in-house bank accounts leading to low impact on the confidentiality of the application.",6.4,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N,N/A CVE-2024-21737,"In SAP Application Interface Framework File Adapter - version 702, a high privilege user can use a function module to traverse through various layers and execute OS commands directly. By this, such user can control the behaviour of the application. This leads to considerable impact on confidentiality, integrity and availability. ",8.4,CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H,N/A CVE-2024-21738,"SAP NetWeaver ABAP Application Server and ABAP Platform do not sufficiently encode user-controlled inputs, resulting in Cross-Site Scripting (XSS) vulnerability. An attacker with low privileges can cause limited impact to confidentiality of the application data after successful exploitation. ",4.1,CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:N/A:N,N/A CVE-2024-22124,"Under certain conditions, Internet Communication Manager (ICM) or SAP Web Dispatcher - versions KERNEL 7.22, KERNEL 7.53, KERNEL 7.54, KRNL64UC 7.22, KRNL64UC 7.22EXT, KRNL64UC 7.53, KRNL64NUC 7.22, KRNL64NUC 7.22_EXT, WEBDISP 7.22_EXT, WEBDISP 7.53, WEBDISP 7.54, could allow an attacker to access information which would otherwise be restricted causing high impact on confidentiality. ",4.1,CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N,N/A CVE-2024-22125,"Under certain conditions the Microsoft Edge browser extension (SAP GUI connector for Microsoft Edge) - version 1.0, allows an attacker to access highly sensitive information which would otherwise be restricted causing high impact on confidentiality. ",7.4,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N,N/A CVE-2023-6594,"The WordPress Button Plugin MaxButtons plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 9.7.4 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled. Administrators can give button creation privileges to users with lower levels (contributor+) which would allow those lower-privileged users to carry out attacks.",4.4,CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N,N/A CVE-2023-6788,"The Metform Elementor Contact Form Builder plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 3.8.1. This is due to missing or incorrect nonce validation on the contents function. This makes it possible for unauthenticated attackers to update the options ""mf_hubsopt_token"", ""mf_hubsopt_refresh_token"", ""mf_hubsopt_token_type"", and ""mf_hubsopt_expires_in"" via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. This would allow an attacker to connect their own Hubspot account to a victim site's metform to obtain leads and contacts.",5.4,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N,N/A CVE-2023-7219,A vulnerability has been found in Totolink N350RT 9.3.5u.6139_B202012 and classified as critical. Affected by this vulnerability is the function loginAuth of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument http_host leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-249853 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.,7.2,CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H,Totolink N350Rt Firmware 9.3.5u.6139_b20201216 CVE-2023-50930,"An issue was discovered in savignano S/Notify before 4.0.2 for Jira. While an administrative user is logged on, the configuration settings of S/Notify can be modified via a CSRF attack. The injection could be initiated by the administrator clicking a malicious link in an email or by visiting a malicious website. If executed while an administrator is logged on to Jira, an attacker could exploit this to modify the configuration of the S/Notify app on that host. This can, in particular, lead to email notifications being no longer encrypted when they should be.",8.3,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L,N/A CVE-2023-50931,"An issue was discovered in savignano S/Notify before 2.0.1 for Bitbucket. While an administrative user is logged on, the configuration settings of S/Notify can be modified via a CSRF attack. The injection could be initiated by the administrator clicking a malicious link in an email or by visiting a malicious website. If executed while an administrator is logged on to Bitbucket, an attacker could exploit this to modify the configuration of the S/Notify app on that host. This can, in particular, lead to email notifications being no longer encrypted when they should be.",8.3,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L,N/A CVE-2023-50932,"An issue was discovered in savignano S/Notify before 4.0.2 for Confluence. While an administrative user is logged on, the configuration settings of S/Notify can be modified via a CSRF attack. The injection could be initiated by the administrator clicking a malicious link in an email or by visiting a malicious website. If executed while an administrator is logged on to Confluence, an attacker could exploit this to modify the configuration of the S/Notify app on that host. This can, in particular, lead to email notifications being no longer encrypted when they should be.",8.3,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L,N/A CVE-2023-6830,"The Formidable Forms plugin for WordPress is vulnerable to HTML injection in versions up to, and including, 6.7. This vulnerability allows unauthenticated users to inject arbitrary HTML code into form fields. When the form data is viewed by an administrator in the Entries View Page, the injected HTML code is rendered, potentially leading to admin area defacement or redirection to malicious websites.",6.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N,N/A CVE-2023-6842,"The Formidable Forms – Contact Form, Survey, Quiz, Payment, Calculator Form & Custom Form Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the name field label and description field label parameter in all versions up to 6.7 (inclusive) due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level access, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. By default, this only affects multi-site installations and installations where unfiltered_html has been disabled. However, in the formidable settings admins can extend form creation, deletion and other management permissions to other user types, which makes it possible for this vulnerability to be exploited by lower level user types as long as they have been granted the proper permissions.",4.4,CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N,N/A CVE-2023-6147,"Qualys Jenkins Plugin for Policy Compliance prior to version and including 1.0.5 was identified to be affected by a security flaw, which was missing a permission check while performing a connectivity check to Qualys Cloud Services. This allowed any user with login access to configure or edit jobs to utilize the plugin and configure potential a rouge endpoint via which it was possible to control response for certain request which could be injected with XXE payloads leading to XXE while processing the response data",5.7,CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N,N/A CVE-2023-7220,A vulnerability was found in Totolink NR1800X 9.1.0u.6279_B20210910 and classified as critical. Affected by this issue is the function loginAuth of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument password leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-249854 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,Totolink Nr1800X Firmware 9.1.0u.6279_b20210910 CVE-2023-49235,"An issue was discovered in libremote_dbg.so on TRENDnet TV-IP1314PI 5.5.3 200714 devices. Filtering of debug information is mishandled during use of popen. Consequently, an attacker can bypass validation and execute a shell command.",9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,Trendnet Tv-Ip1314Pi Firmware 5.5.3 CVE-2023-49236,"A stack-based buffer overflow was discovered on TRENDnet TV-IP1314PI 5.5.3 200714 devices, leading to arbitrary command execution. This occurs because of lack of length validation during an sscanf of a user-entered scale field in the RTSP playback function of davinci.",9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,Trendnet Tv-Ip1314Pi Firmware 5.5.3 CVE-2023-49237,An issue was discovered on TRENDnet TV-IP1314PI 5.5.3 200714 devices. Command injection can occur because the system function is used by davinci to unpack language packs without strict filtering of URL strings.,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,Trendnet Tv-Ip1314Pi Firmware 5.5.3 CVE-2023-50585,Tenda A18 v15.13.07.09 was discovered to contain a stack overflow via the devName parameter in the formSetDeviceName function.,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,Tenda A18 Firmware 15.13.07.09 CVE-2023-50974,"In Appwrite CLI before 3.0.0, when using the login command, the credentials of the Appwrite user are stored in a ~/.appwrite/prefs.json file with 0644 as UNIX permissions. Any user of the local system can access those credentials.",5.5,CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N,N/A CVE-2023-6148,"Qualys Jenkins Plugin for Policy Compliance prior to version and including 1.0.5 was identified to be affected by a security flaw, which was missing a permission check while performing a connectivity check to Qualys Cloud Services. This allowed any user with login access and access to configure or edit jobs to utilize the plugin to configure a potential rouge endpoint via which it was possible to control response for certain request which could be injected with XSS payloads leading to XSS while processing the response data",5.7,CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N,N/A CVE-2023-6149," Qualys Jenkins Plugin for WAS prior to version and including 2.0.11 was identified to be affected by a security flaw, which was missing a permission check while performing a connectivity check to Qualys Cloud Services. This allowed any user with login access to configure or edit jobs to utilize the plugin and configure potential a rouge endpoint via which it was possible to control response for certain request which could be injected with XXE payloads leading to XXE while processing the response data",5.7,CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N,N/A CVE-2024-22368,The Spreadsheet::ParseXLSX package before 0.28 for Perl can encounter an out-of-memory condition during parsing of a crafted XLSX document. This occurs because the memoize implementation does not have appropriate constraints on merged cells.,5.5,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H,N/A CVE-2023-42797,"A vulnerability has been identified in CP-8031 MASTER MODULE (All versions < CPCI85 V05.20), CP-8050 MASTER MODULE (All versions < CPCI85 V05.20). The network configuration service of affected devices contains a flaw in the conversion of ipv4 addresses that could lead to an uninitialized variable being used in succeeding validation steps. By uploading specially crafted network configuration, an authenticated remote attacker could be able to inject commands that are executed on the device with root privileges during device startup.",6.6,CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H,"Siemens Sicam A8000 Cp-8031 Firmware, Siemens Sicam A8000 Cp-8050 Firmware" CVE-2023-44120,A vulnerability has been identified in Spectrum Power 7 (All versions < V23Q4). The affected product's sudo configuration permits the local administrative account to execute several entries as root user. This could allow an authenticated local attacker to inject arbitrary code and gain root access.,7.8,CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,N/A CVE-2023-49121,A vulnerability has been identified in Solid Edge SE2023 (All versions < V223.0 Update 10). The affected application is vulnerable to heap-based buffer overflow while parsing specially crafted PAR files. This could allow an attacker to execute code in the context of the current process.,7.8,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,N/A CVE-2023-49122,A vulnerability has been identified in Solid Edge SE2023 (All versions < V223.0 Update 10). The affected application is vulnerable to heap-based buffer overflow while parsing specially crafted PAR files. This could allow an attacker to execute code in the context of the current process.,7.8,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,N/A CVE-2023-49123,A vulnerability has been identified in Solid Edge SE2023 (All versions < V223.0 Update 10). The affected application is vulnerable to heap-based buffer overflow while parsing specially crafted PAR files. This could allow an attacker to execute code in the context of the current process.,7.8,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,N/A CVE-2023-49124,A vulnerability has been identified in Solid Edge SE2023 (All versions < V223.0 Update 10). The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted PAR files. This could allow an attacker to execute code in the context of the current process.,7.8,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,N/A CVE-2023-49126,A vulnerability has been identified in Solid Edge SE2023 (All versions < V223.0 Update 10). The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted PAR files. This could allow an attacker to execute code in the context of the current process.,7.8,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,N/A CVE-2023-49127,A vulnerability has been identified in Solid Edge SE2023 (All versions < V223.0 Update 10). The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted PAR files. This could allow an attacker to execute code in the context of the current process.,7.8,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,N/A CVE-2023-49128,A vulnerability has been identified in Solid Edge SE2023 (All versions < V223.0 Update 10). The affected application contains an out of bounds write past the end of an allocated buffer while parsing a specially crafted PAR file. This could allow an attacker to execute code in the context of the current process.,7.8,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,N/A CVE-2023-49129,A vulnerability has been identified in Solid Edge SE2023 (All versions < V223.0 Update 10). The affected applications contain a stack overflow vulnerability while parsing specially crafted PAR files. This could allow an attacker to execute code in the context of the current process.,7.8,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,N/A CVE-2023-49130,A vulnerability has been identified in Solid Edge SE2023 (All versions < V223.0 Update 10). The affected application is vulnerable to uninitialized pointer access while parsing specially crafted PAR files. An attacker could leverage this vulnerability to execute code in the context of the current process.,7.8,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,N/A CVE-2023-49131,A vulnerability has been identified in Solid Edge SE2023 (All versions < V223.0 Update 10). The affected application is vulnerable to uninitialized pointer access while parsing specially crafted PAR files. An attacker could leverage this vulnerability to execute code in the context of the current process.,7.8,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,N/A CVE-2023-49132,A vulnerability has been identified in Solid Edge SE2023 (All versions < V223.0 Update 10). The affected application is vulnerable to uninitialized pointer access while parsing specially crafted PAR files. An attacker could leverage this vulnerability to execute code in the context of the current process.,7.8,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,N/A CVE-2023-49251,"A vulnerability has been identified in SIMATIC CN 4100 (All versions < V2.7). The ""intermediate installation"" system state of the affected application allows an attacker to add their own login credentials to the device. This allows an attacker to remotely login as root and take control of the device even after the affected device is fully set up.",8.8,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,N/A CVE-2023-49252,A vulnerability has been identified in SIMATIC CN 4100 (All versions < V2.7). The affected application allows IP configuration change without authentication to the device. This could allow an attacker to cause denial of service condition.,7.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,N/A CVE-2023-49621,"A vulnerability has been identified in SIMATIC CN 4100 (All versions < V2.7). The ""intermediate installation"" system state of the affected application uses default credential with admin privileges. An attacker could use the credentials to gain complete control of the affected device.",9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,N/A CVE-2023-49722,"Network port 8899 open in WiFi firmware of BCC101/BCC102/BCC50 products, that allows an attacker to connect to the device via same WiFi network.",8.3,CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H,"Bosch Bcc101 Firmware, Bosch Bcc50 Firmware, Bosch Bcc102 Firmware" CVE-2023-51438,"A vulnerability has been identified in SIMATIC IPC1047E (All versions with maxView Storage Manager < V4.14.00.26068 on Windows), SIMATIC IPC647E (All versions with maxView Storage Manager < V4.14.00.26068 on Windows), SIMATIC IPC847E (All versions with maxView Storage Manager < V4.14.00.26068 on Windows). In default installations of maxView Storage Manager where Redfish® server is configured for remote system management, a vulnerability has been identified that can provide unauthorized access.",10.0,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H,N/A CVE-2023-51439,"A vulnerability has been identified in JT2Go (All versions < V14.3.0.6), Teamcenter Visualization V13.3 (All versions < V13.3.0.13), Teamcenter Visualization V14.1 (All versions < V14.1.0.12), Teamcenter Visualization V14.2 (All versions < V14.2.0.9), Teamcenter Visualization V14.3 (All versions < V14.3.0.6). The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted CGM files. This could allow an attacker to execute code in the context of the current process.",7.8,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,N/A CVE-2023-51744,"A vulnerability has been identified in JT2Go (All versions < V14.3.0.6), Teamcenter Visualization V13.3 (All versions < V13.3.0.13), Teamcenter Visualization V14.1 (All versions < V14.1.0.12), Teamcenter Visualization V14.2 (All versions < V14.2.0.9), Teamcenter Visualization V14.3 (All versions < V14.3.0.6). The affected applications contain a null pointer dereference vulnerability while parsing specially crafted CGM files. An attacker could leverage this vulnerability to crash the application causing denial of service condition.",3.3,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L,N/A CVE-2023-51745,"A vulnerability has been identified in JT2Go (All versions < V14.3.0.6), Teamcenter Visualization V13.3 (All versions < V13.3.0.13), Teamcenter Visualization V14.1 (All versions < V14.1.0.12), Teamcenter Visualization V14.2 (All versions < V14.2.0.9), Teamcenter Visualization V14.3 (All versions < V14.3.0.6). The affected applications contain a stack overflow vulnerability while parsing specially crafted CGM files. This could allow an attacker to execute code in the context of the current process.",7.8,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,N/A CVE-2023-51746,"A vulnerability has been identified in JT2Go (All versions < V14.3.0.6), Teamcenter Visualization V13.3 (All versions < V13.3.0.13), Teamcenter Visualization V14.1 (All versions < V14.1.0.12), Teamcenter Visualization V14.2 (All versions < V14.2.0.9), Teamcenter Visualization V14.3 (All versions < V14.3.0.6). The affected applications contain a stack overflow vulnerability while parsing specially crafted CGM files. This could allow an attacker to execute code in the context of the current process.",7.8,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,N/A CVE-2023-5347,An Improper Verification of Cryptographic Signature vulnerability in the update process of Korenix JetNet Series allows replacing the whole operating system including Trusted Executables. This issue affects JetNet devices older than firmware version 2024/01.,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,"Korenix Jetnet 6910G-M12 Hvdc Firmware 1.0, Korenix Jetnet 7310G-V2 Firmware 1.0, Korenix Jetnet 6528Gf-2Dc24 Firmware 1.0, Korenix Jetnet 5612G-4F Firmware 1.2, Korenix Jetnet 6828Gf-Ac-Dc24-Us Firmware 1.0, Korenix Jetnet 6628X-4F-Eu Firmware 1.0, Korenix Jetnet 6728G-24P-Ac-2Dc-Eu Firmware 1.1, Korenix Jetnet 7628Xp-4F-Us Firmware 1.1, Korenix Jetnet 6728G-24P-Ac-2Dc-Us Firmware 1.1, Korenix Jetnet 6828Gf-2Ac-Au Firmware 1.0, Korenix Jetnet 4508-W Firmware 2.3, Korenix Jetnet 4508If-Mw Firmware 1.3, Korenix Jetnet 5728G-24P-Ac-2Dc-Eu Firmware 2.1, Korenix Jetnet 6628Xp-4F-Us Firmware 1.1, Korenix Jetnet 4508 Firmware 2.3, Korenix Jetnet 5620G-4C Firmware 1.1, Korenix Jetnet 6828Gf-Ac-Dc24-Eu Firmware 1.0, Korenix Jetnet 4508F-Sw Firmware 2.3, Korenix Jetnet 4508If-M Firmware 1.3, Korenix Jetnet 6528Gf-2Ac-Us Firmware 1.0, Korenix Jetnet 6828Gf-2Dc24 Firmware 1.0, Korenix Jetnet 6528Gf-2Dc48 Firmware 1.0, Korenix Jetnet 4508F-Mw Firmware 2.3, Korenix Jetnet 4508I-W Firmware 1.3, Korenix Jetnet 4508F-M Firmware 2.3, Korenix Jetnet 5612Gp-4F Firmware 1.2, Korenix Jetnet 7628Xp-4F-Us Firmware 1.0, Korenix Jetnet 6528Gf-Ac-Eu Firmware 1.0, Korenix Jetnet 4508If-S Firmware 1.3, Korenix Jetnet 4508F-S Firmware 2.3, Korenix Jetnet 6828Gf-2Ac-Eu Firmware 1.0, Korenix Jetnet 6528Gf-2Ac-Eu Firmware 1.0, Korenix Jetnet 7628X-4F-Us Firmware 1.0, Korenix Jetnet 5728G-24P-Ac-2Dc-Us Firmware 2.1, Korenix Jetnet 7628Xp-4F-Eu Firmware 1.0, Korenix Jetnet 7628Xp-4F-Eu Firmware 1.1, Korenix Jetnet 7628X-4F-Eu Firmware 1.0, Korenix Jetnet 6828Gf-Ac-Us Firmware 1.0, Korenix Jetnet 7714G-M12 Hvdc Firmware 1.0, Korenix Jetnet 6828Gf-2Ac-Us Firmware 1.0, Korenix Jetnet 6828Gf-2Dc48 Firmware 1.0, Korenix Jetnet 4508If-Sw Firmware 1.3, Korenix Jetnet 5310G Firmware 2.6, Korenix Jetnet 6528Gf-Ac-Us Firmware 1.0" CVE-2023-5376,An Improper Authentication vulnerability in Korenix JetNet TFTP allows abuse of this service. This issue affects JetNet devices older than firmware version 2024/01.,8.6,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N,"Korenix Jetnet 6910G-M12 Hvdc Firmware 1.0, Korenix Jetnet 7310G-V2 Firmware 1.0, Korenix Jetnet 6528Gf-2Dc24 Firmware 1.0, Korenix Jetnet 5612G-4F Firmware 1.2, Korenix Jetnet 6828Gf-Ac-Dc24-Us Firmware 1.0, Korenix Jetnet 6628X-4F-Eu Firmware 1.0, Korenix Jetnet 6728G-24P-Ac-2Dc-Eu Firmware 1.1, Korenix Jetnet 7628Xp-4F-Us Firmware 1.1, Korenix Jetnet 6728G-24P-Ac-2Dc-Us Firmware 1.1, Korenix Jetnet 6828Gf-2Ac-Au Firmware 1.0, Korenix Jetnet 4508-W Firmware 2.3, Korenix Jetnet 4508If-Mw Firmware 1.3, Korenix Jetnet 5728G-24P-Ac-2Dc-Eu Firmware 2.1, Korenix Jetnet 6628Xp-4F-Us Firmware 1.1, Korenix Jetnet 4508 Firmware 2.3, Korenix Jetnet 5620G-4C Firmware 1.1, Korenix Jetnet 6828Gf-Ac-Dc24-Eu Firmware 1.0, Korenix Jetnet 4508F-Sw Firmware 2.3, Korenix Jetnet 4508If-M Firmware 1.3, Korenix Jetnet 6528Gf-2Ac-Us Firmware 1.0, Korenix Jetnet 6828Gf-2Dc24 Firmware 1.0, Korenix Jetnet 6528Gf-2Dc48 Firmware 1.0, Korenix Jetnet 4508F-Mw Firmware 2.3, Korenix Jetnet 4508I-W Firmware 1.3, Korenix Jetnet 4508F-M Firmware 2.3, Korenix Jetnet 5612Gp-4F Firmware 1.2, Korenix Jetnet 7628Xp-4F-Us Firmware 1.0, Korenix Jetnet 6528Gf-Ac-Eu Firmware 1.0, Korenix Jetnet 4508If-S Firmware 1.3, Korenix Jetnet 4508F-S Firmware 2.3, Korenix Jetnet 6828Gf-2Ac-Eu Firmware 1.0, Korenix Jetnet 6528Gf-2Ac-Eu Firmware 1.0, Korenix Jetnet 7628X-4F-Us Firmware 1.0, Korenix Jetnet 5728G-24P-Ac-2Dc-Us Firmware 2.1, Korenix Jetnet 7628Xp-4F-Eu Firmware 1.0, Korenix Jetnet 7628Xp-4F-Eu Firmware 1.1, Korenix Jetnet 7628X-4F-Eu Firmware 1.0, Korenix Jetnet 6828Gf-Ac-Us Firmware 1.0, Korenix Jetnet 7714G-M12 Hvdc Firmware 1.0, Korenix Jetnet 6828Gf-2Ac-Us Firmware 1.0, Korenix Jetnet 6828Gf-2Dc48 Firmware 1.0, Korenix Jetnet 4508If-Sw Firmware 1.3, Korenix Jetnet 5310G Firmware 2.6, Korenix Jetnet 6528Gf-Ac-Us Firmware 1.0" CVE-2024-22370,In JetBrains YouTrack before 2023.3.22666 stored XSS via markdown was possible,4.6,CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N,N/A CVE-2022-28975,A stored cross-site scripting (XSS) vulnerability in Infoblox NIOS v8.5.2-409296 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the VLAN View Name field.,5.4,CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N,Infoblox Nios 8.5.2-409296 CVE-2023-7221,A vulnerability was found in Totolink T6 4.1.9cu.5241_B20210923. It has been classified as critical. This affects the function main of the file /cgi-bin/cstecgi.cgi?action=login of the component HTTP POST Request Handler. The manipulation of the argument v41 leads to buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-249855. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,Totolink T6 Firmware 4.1.9cu.5241_b20210923 CVE-2024-0206," A symbolic link manipulation vulnerability in Trellix Anti-Malware Engine prior to the January 2024 release allows an authenticated local user to potentially gain an escalation of privileges. This was achieved by adding an entry to the registry under the Trellix ENS registry folder with a symbolic link to files that the user wouldn't normally have permission to. After a scan, the Engine would follow the links and remove the files ",7.1,CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H,Microsoft Windows CVE-2024-0213," A buffer overflow vulnerability in TA for Linux and TA for MacOS prior to 5.8.1 allows a local user to gain elevated permissions, or cause a Denial of Service (DoS), through exploiting a memory corruption issue in the TA service, which runs as root. This may also result in the disabling of event reporting to ePO, caused by failure to validate input from the file correctly. ",8.2,CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H,N/A CVE-2022-36763,"EDK2 is susceptible to a vulnerability in the Tcg2MeasureGptTable() function, allowing a user to trigger a heap buffer overflow via a local network. Successful exploitation of this vulnerability may result in a compromise of confidentiality, integrity, and/or availability.",7.0,CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H,N/A CVE-2022-36764,"EDK2 is susceptible to a vulnerability in the Tcg2MeasurePeImage() function, allowing a user to trigger a heap buffer overflow via a local network. Successful exploitation of this vulnerability may result in a compromise of confidentiality, integrity, and/or availability.",7.0,CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H,N/A CVE-2022-36765,"EDK2 is susceptible to a vulnerability in the CreateHob() function, allowing a user to trigger a integer overflow to buffer overflow via a local network. Successful exploitation of this vulnerability may result in a compromise of confidentiality, integrity, and/or availability.",7.0,CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H,N/A CVE-2023-7222,A vulnerability was found in Totolink X2000R 1.0.0-B20221212.1452. It has been declared as critical. This vulnerability affects the function formTmultiAP of the file /bin/boa of the component HTTP POST Request Handler. The manipulation of the argument submit-url leads to buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-249856. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.,7.2,CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H,Totolink X2000R Firmware 1.0.0-b20221212.1452 CVE-2023-7223,A vulnerability classified as problematic has been found in Totolink T6 4.1.9cu.5241_B20210923. This affects an unknown part of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument topicurl with the input showSyslog leads to improper access controls. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-249867. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.,5.3,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N,Totolink T6 Firmware 4.1.9cu.5241_b20210923 CVE-2023-6129,"Issue summary: The POLY1305 MAC (message authentication code) implementation contains a bug that might corrupt the internal state of applications running on PowerPC CPU based platforms if the CPU provides vector instructions. Impact summary: If an attacker can influence whether the POLY1305 MAC algorithm is used, the application state might be corrupted with various application dependent consequences. The POLY1305 MAC (message authentication code) implementation in OpenSSL for PowerPC CPUs restores the contents of vector registers in a different order than they are saved. Thus the contents of some of these vector registers are corrupted when returning to the caller. The vulnerable code is used only on newer PowerPC processors supporting the PowerISA 2.07 instructions. The consequences of this kind of internal application state corruption can be various - from no consequences, if the calling application does not depend on the contents of non-volatile XMM registers at all, to the worst consequences, where the attacker could get complete control of the application process. However unless the compiler uses the vector registers for storing pointers, the most likely consequence, if any, would be an incorrect result of some application dependent calculations or a crash leading to a denial of service. The POLY1305 MAC algorithm is most frequently used as part of the CHACHA20-POLY1305 AEAD (authenticated encryption with associated data) algorithm. The most common usage of this AEAD cipher is with TLS protocol versions 1.2 and 1.3. If this cipher is enabled on the server a malicious client can influence whether this AEAD cipher is used. This implies that TLS server applications using OpenSSL can be potentially impacted. However we are currently not aware of any concrete application that would be affected by this issue therefore we consider this a Low severity security issue.",6.5,CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H,N/A CVE-2024-22164,"In Splunk Enterprise Security (ES) versions below 7.1.2, an attacker can use investigation attachments to perform a denial of service (DoS) to the Investigation. The attachment endpoint does not properly limit the size of the request which lets an attacker cause the Investigation to become inaccessible.",4.3,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L,N/A CVE-2024-22165,"In Splunk Enterprise Security (ES) versions lower than 7.1.2, an attacker can create a malformed Investigation to perform a denial of service (DoS). The malformed investigation prevents the generation and rendering of the Investigations manager until it is deleted.
The vulnerability requires an authenticated session and access to create an Investigation. It only affects the availability of the Investigations manager, but without the manager, the Investigations functionality becomes unusable for most users.",6.5,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H,N/A CVE-2022-48618,"The issue was addressed with improved checks. This issue is fixed in macOS Ventura 13.1, watchOS 9.2, iOS 16.2 and iPadOS 16.2, tvOS 16.2. An attacker with arbitrary read and write capability may be able to bypass Pointer Authentication. Apple is aware of a report that this issue may have been exploited against versions of iOS released before iOS 15.7.1.",7.0,CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H,"Apple Tvos, Apple Iphone Os, Apple Ipados, Apple Macos, Apple Watchos" CVE-2024-0056,Microsoft.Data.SqlClient and System.Data.SqlClient SQL Data Provider Security Feature Bypass Vulnerability,8.7,CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N,"Microsoft Windows 11 22H2, Microsoft Windows Server 2008 r2, Microsoft Windows 10 21H2, Microsoft Windows 11 21H2, Microsoft Windows 10 22H2, Microsoft Windows 10 1809, Microsoft Windows Server 2012, Microsoft Windows Server 2019, Microsoft Windows Server 2022 23H2, Microsoft Windows Server 2008, Microsoft Windows 10 1607, Microsoft Windows Server 2016, Microsoft Windows Server 2022, Microsoft Windows Server 2012 r2, Microsoft Windows 11 23H2" CVE-2024-0057,"NET, .NET Framework, and Visual Studio Security Feature Bypass Vulnerability",9.1,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N,"Microsoft Windows 11 22H2, Microsoft Windows Server 2008 r2, Microsoft Windows 10 21H2, Microsoft Windows 11 21H2, Microsoft Windows 10 22H2, Microsoft Windows 10 1809, Microsoft Windows Server 2012, Microsoft Windows Server 2019, Microsoft Windows Server 2022 23H2, Microsoft Windows Server 2008, Microsoft Windows 10 1607, Microsoft Windows Server 2016, Microsoft Windows Server 2022, Microsoft Windows Server 2012 r2, Microsoft Windows 11 23H2" CVE-2024-0226,Synopsys Seeker versions prior to 2023.12.0 are vulnerable to a stored cross-site scripting vulnerability through a specially crafted payload.,4.8,CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N,N/A CVE-2024-0340,"A vulnerability was found in vhost_new_msg in drivers/vhost/vhost.c in the Linux kernel, which does not properly initialize memory in messages passed between virtual guests and the host operating system in the vhost/vhost.c:vhost_new_msg() function. This issue can allow local privileged users to read some kernel memory contents when reading from the /dev/vhost-net device file.",4.4,CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N,"Linux Linux Kernel 6.4, Linux Linux Kernel" CVE-2024-20652,Windows HTML Platforms Security Feature Bypass Vulnerability,8.1,CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H,"Microsoft Windows 11 22H2, Microsoft Windows 10 21H2, Microsoft Windows 11 21H2, Microsoft Windows 10 1507, Microsoft Windows 10 22H2, Microsoft Windows 10 1809, Microsoft Windows Server 2008, Microsoft Windows Server 2012, Microsoft Windows Server 2019, Microsoft Windows 10 1607, Microsoft Windows Server 2016, Microsoft Windows Server 2022, Microsoft Windows Server 2012 r2, Microsoft Windows 11 23H2" CVE-2024-20653,Microsoft Common Log File System Elevation of Privilege Vulnerability,7.8,CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,"Microsoft Windows 11 22H2, Microsoft Windows 10 21H2, Microsoft Windows 11 21H2, Microsoft Windows 10 1507, Microsoft Windows 10 22H2, Microsoft Windows 10 1809, Microsoft Windows Server 2008, Microsoft Windows Server 2012, Microsoft Windows Server 2019, Microsoft Windows 10 1607, Microsoft Windows Server 2016, Microsoft Windows Server 2022, Microsoft Windows Server 2012 r2, Microsoft Windows 11 23H2" CVE-2024-20654,Microsoft ODBC Driver Remote Code Execution Vulnerability,8.0,CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H,"Microsoft Windows 11 22H2, Microsoft Windows 10 21H2, Microsoft Windows 11 21H2, Microsoft Windows 10 1507, Microsoft Windows 10 22H2, Microsoft Windows 10 1809, Microsoft Windows Server 2008, Microsoft Windows Server 2012, Microsoft Windows Server 2019, Microsoft Windows 10 1607, Microsoft Windows Server 2016, Microsoft Windows Server 2022, Microsoft Windows Server 2012 r2, Microsoft Windows 11 23H2" CVE-2024-20655,Microsoft Online Certificate Status Protocol (OCSP) Remote Code Execution Vulnerability,6.6,CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H,"Microsoft Windows Server 2008, Microsoft Windows Server 2012, Microsoft Windows Server 2019, Microsoft Windows Server 2022 23H2, Microsoft Windows Server 2016, Microsoft Windows Server 2022, Microsoft Windows Server 2012 r2" CVE-2024-20656,Visual Studio Elevation of Privilege Vulnerability,7.8,CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,N/A CVE-2024-20657,Windows Group Policy Elevation of Privilege Vulnerability,7.0,CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H,"Microsoft Windows 11 22H2, Microsoft Windows 10 21H2, Microsoft Windows 11 21H2, Microsoft Windows 10 1507, Microsoft Windows 10 22H2, Microsoft Windows 10 1809, Microsoft Windows Server 2008, Microsoft Windows Server 2012, Microsoft Windows Server 2019, Microsoft Windows 10 1607, Microsoft Windows Server 2016, Microsoft Windows Server 2022, Microsoft Windows Server 2012 r2, Microsoft Windows 11 23H2" CVE-2024-20658,Microsoft Virtual Hard Disk Elevation of Privilege Vulnerability,7.8,CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,"Microsoft Windows 11 22H2, Microsoft Windows 10 21H2, Microsoft Windows 11 21H2, Microsoft Windows 10 1507, Microsoft Windows 10 22H2, Microsoft Windows 10 1809, Microsoft Windows Server 2012, Microsoft Windows Server 2019, Microsoft Windows 10 1607, Microsoft Windows Server 2016, Microsoft Windows Server 2022, Microsoft Windows Server 2012 r2, Microsoft Windows 11 23H2" CVE-2024-20660,Microsoft Message Queuing Information Disclosure Vulnerability,6.5,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N,"Microsoft Windows 11 22H2, Microsoft Windows 10 21H2, Microsoft Windows 11 21H2, Microsoft Windows 10 1507, Microsoft Windows 10 22H2, Microsoft Windows 10 1809, Microsoft Windows Server 2008, Microsoft Windows Server 2012, Microsoft Windows Server 2019, Microsoft Windows 10 1607, Microsoft Windows Server 2016, Microsoft Windows Server 2022, Microsoft Windows Server 2012 r2, Microsoft Windows 11 23H2" CVE-2024-20661,Microsoft Message Queuing (MSMQ) Denial of Service Vulnerability,7.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,"Microsoft Windows 11 22H2, Microsoft Windows 10 21H2, Microsoft Windows 11 21H2, Microsoft Windows 10 1507, Microsoft Windows 10 22H2, Microsoft Windows 10 1809, Microsoft Windows Server 2008, Microsoft Windows Server 2012, Microsoft Windows Server 2019, Microsoft Windows 10 1607, Microsoft Windows Server 2016, Microsoft Windows Server 2022, Microsoft Windows Server 2012 r2, Microsoft Windows 11 23H2" CVE-2024-20662,Windows Online Certificate Status Protocol (OCSP) Information Disclosure Vulnerability,4.9,CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N,"Microsoft Windows Server 2008, Microsoft Windows Server 2012, Microsoft Windows Server 2019, Microsoft Windows Server 2022 23H2, Microsoft Windows Server 2016, Microsoft Windows Server 2022, Microsoft Windows Server 2012 r2" CVE-2024-20663,Windows Message Queuing Client (MSMQC) Information Disclosure,6.5,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N,"Microsoft Windows 11 22H2, Microsoft Windows 10 21H2, Microsoft Windows 11 21H2, Microsoft Windows 10 1507, Microsoft Windows 10 22H2, Microsoft Windows 10 1809, Microsoft Windows Server 2008, Microsoft Windows Server 2012, Microsoft Windows Server 2019, Microsoft Windows 10 1607, Microsoft Windows Server 2016, Microsoft Windows Server 2022, Microsoft Windows Server 2012 r2, Microsoft Windows 11 23H2" CVE-2024-20664,Microsoft Message Queuing Information Disclosure Vulnerability,6.5,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N,"Microsoft Windows 11 22H2, Microsoft Windows 10 21H2, Microsoft Windows 11 21H2, Microsoft Windows 10 1507, Microsoft Windows 10 22H2, Microsoft Windows 10 1809, Microsoft Windows Server 2008, Microsoft Windows Server 2012, Microsoft Windows Server 2019, Microsoft Windows 10 1607, Microsoft Windows Server 2016, Microsoft Windows Server 2022, Microsoft Windows Server 2012 r2, Microsoft Windows 11 23H2" CVE-2024-20666,BitLocker Security Feature Bypass Vulnerability,6.6,CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,"Microsoft Windows 11 22H2, Microsoft Windows 10 21H2, Microsoft Windows 11 21H2, Microsoft Windows 10 1507, Microsoft Windows 10 22H2, Microsoft Windows 10 1809, Microsoft Windows 10 1607, Microsoft Windows Server 2016, Microsoft Windows Server 2022, Microsoft Windows Server 2019, Microsoft Windows 11 23H2" CVE-2024-20672,.NET Denial of Service Vulnerability,7.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,N/A CVE-2024-20674,Windows Kerberos Security Feature Bypass Vulnerability,8.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,"Microsoft Windows 11 22H2, Microsoft Windows 10 21H2, Microsoft Windows 11 21H2, Microsoft Windows 10 1507, Microsoft Windows 10 22H2, Microsoft Windows 10 1809, Microsoft Windows Server 2008, Microsoft Windows Server 2012, Microsoft Windows Server 2019, Microsoft Windows 10 1607, Microsoft Windows Server 2016, Microsoft Windows Server 2022, Microsoft Windows Server 2012 r2, Microsoft Windows 11 23H2" CVE-2024-20676,Azure Storage Mover Remote Code Execution Vulnerability,8.0,CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H,N/A CVE-2024-20677,"A security vulnerability exists in FBX that could lead to remote code execution. To mitigate this vulnerability, the ability to insert FBX files has been disabled in Word, Excel, PowerPoint and Outlook for Windows and Mac. Versions of Office that had this feature enabled will no longer have access to it. This includes Office 2019, Office 2021, Office LTSC for Mac 2021, and Microsoft 365. As of February 13, 2024, the ability to insert FBX files has also been disabled in 3D Viewer. 3D models in Office documents that were previously inserted from a FBX file will continue to work as expected unless the Link to File option was chosen at insert time. This change is effective as of the January 9, 2024 security update.",7.8,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,N/A CVE-2024-20680,Windows Message Queuing Client (MSMQC) Information Disclosure,6.5,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N,"Microsoft Windows 11 22H2, Microsoft Windows 10 21H2, Microsoft Windows 11 21H2, Microsoft Windows 10 1507, Microsoft Windows 10 22H2, Microsoft Windows 10 1809, Microsoft Windows Server 2008, Microsoft Windows Server 2012, Microsoft Windows Server 2019, Microsoft Windows 10 1607, Microsoft Windows Server 2016, Microsoft Windows Server 2022, Microsoft Windows Server 2012 r2, Microsoft Windows 11 23H2" CVE-2024-20681,Windows Subsystem for Linux Elevation of Privilege Vulnerability,7.8,CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,"Microsoft Windows 11 22H2, Microsoft Windows 10 21H2, Microsoft Windows 11 21H2, Microsoft Windows 10 22H2, Microsoft Windows Server 2022 23H2, Microsoft Windows Server 2022, Microsoft Windows 11 23H2" CVE-2024-20682,Windows Cryptographic Services Remote Code Execution Vulnerability,7.8,CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,"Microsoft Windows 11 22H2, Microsoft Windows 10 21H2, Microsoft Windows 11 21H2, Microsoft Windows 10 1507, Microsoft Windows 10 22H2, Microsoft Windows 10 1809, Microsoft Windows Server 2012, Microsoft Windows Server 2019, Microsoft Windows 10 1607, Microsoft Windows Server 2016, Microsoft Windows Server 2022, Microsoft Windows Server 2012 r2, Microsoft Windows 11 23H2" CVE-2024-20683,Win32k Elevation of Privilege Vulnerability,7.8,CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,"Microsoft Windows 11 22H2, Microsoft Windows 10 21H2, Microsoft Windows 11 21H2, Microsoft Windows 10 1507, Microsoft Windows 10 22H2, Microsoft Windows 10 1809, Microsoft Windows Server 2008, Microsoft Windows Server 2012, Microsoft Windows Server 2019, Microsoft Windows 10 1607, Microsoft Windows Server 2016, Microsoft Windows Server 2022, Microsoft Windows Server 2012 r2, Microsoft Windows 11 23H2" CVE-2024-20686,Win32k Elevation of Privilege Vulnerability,7.8,CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,Microsoft Windows Server 2022 23H2 CVE-2024-20687,Microsoft AllJoyn API Denial of Service Vulnerability,7.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,"Microsoft Windows 11 22H2, Microsoft Windows 10 21H2, Microsoft Windows 11 21H2, Microsoft Windows 10 1507, Microsoft Windows 10 22H2, Microsoft Windows 10 1809, Microsoft Windows 10 1607, Microsoft Windows Server 2016, Microsoft Windows Server 2022, Microsoft Windows Server 2019, Microsoft Windows 11 23H2" CVE-2024-20690,Windows Nearby Sharing Spoofing Vulnerability,6.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N,"Microsoft Windows 11 22H2, Microsoft Windows 10 21H2, Microsoft Windows 11 21H2, Microsoft Windows 10 22H2, Microsoft Windows 10 1809, Microsoft Windows 11 23H2" CVE-2024-20691,Windows Themes Information Disclosure Vulnerability,4.7,CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N,"Microsoft Windows 11 22H2, Microsoft Windows 10 21H2, Microsoft Windows Server 2008 r2, Microsoft Windows 11 21H2, Microsoft Windows 10 1507, Microsoft Windows 10 22H2, Microsoft Windows 10 1809, Microsoft Windows Server 2012, Microsoft Windows Server 2019, Microsoft Windows 10 1607, Microsoft Windows Server 2016, Microsoft Windows Server 2022, Microsoft Windows Server 2012 r2, Microsoft Windows 11 23H2" CVE-2024-20692,Microsoft Local Security Authority Subsystem Service Information Disclosure Vulnerability,5.7,CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N,"Microsoft Windows 11 22H2, Microsoft Windows 10 21H2, Microsoft Windows 11 21H2, Microsoft Windows 10 1507, Microsoft Windows 10 22H2, Microsoft Windows 10 1809, Microsoft Windows Server 2008, Microsoft Windows Server 2012, Microsoft Windows Server 2019, Microsoft Windows Server 2022 23H2, Microsoft Windows 10 1607, Microsoft Windows Server 2016, Microsoft Windows Server 2022, Microsoft Windows Server 2012 r2, Microsoft Windows 11 23H2" CVE-2024-20694,Windows CoreMessaging Information Disclosure Vulnerability,5.5,CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N,"Microsoft Windows 11 22H2, Microsoft Windows 10 21H2, Microsoft Windows 11 21H2, Microsoft Windows 10 22H2, Microsoft Windows 10 1809, Microsoft Windows Server 2022 23H2, Microsoft Windows 10 1607, Microsoft Windows Server 2016, Microsoft Windows Server 2022, Microsoft Windows Server 2019, Microsoft Windows 11 23H2" CVE-2024-20696,Windows libarchive Remote Code Execution Vulnerability,7.3,CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H,"Microsoft Windows 11 22H2, Microsoft Windows 10 21H2, Microsoft Windows 11 21H2, Microsoft Windows 10 22H2, Microsoft Windows 10 1809, Microsoft Windows Server 2022 23H2, Microsoft Windows Server 2022, Microsoft Windows Server 2019, Microsoft Windows 11 23H2" CVE-2024-20697,Windows libarchive Remote Code Execution Vulnerability,7.3,CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H,"Microsoft Windows Server 2022 23H2, Microsoft Windows 11 22H2, Microsoft Windows 11 23H2" CVE-2024-20698,Windows Kernel Elevation of Privilege Vulnerability,7.8,CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,"Microsoft Windows 11 22H2, Microsoft Windows 10 21H2, Microsoft Windows 11 21H2, Microsoft Windows 10 22H2, Microsoft Windows 10 1809, Microsoft Windows Server 2022 23H2, Microsoft Windows Server 2022, Microsoft Windows Server 2019, Microsoft Windows 11 23H2" CVE-2024-20699,Windows Hyper-V Denial of Service Vulnerability,5.5,CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H,"Microsoft Windows 11 22H2, Microsoft Windows 10 21H2, Microsoft Windows 11 21H2, Microsoft Windows 10 22H2, Microsoft Windows 10 1809, Microsoft Windows Server 2022 23H2, Microsoft Windows Server 2022, Microsoft Windows Server 2019, Microsoft Windows 11 23H2" CVE-2024-20700,Windows Hyper-V Remote Code Execution Vulnerability,7.5,CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H,"Microsoft Windows 11 22H2, Microsoft Windows 10 21H2, Microsoft Windows 11 21H2, Microsoft Windows 10 22H2, Microsoft Windows 10 1809, Microsoft Windows Server 2022 23H2, Microsoft Windows Server 2022, Microsoft Windows Server 2019, Microsoft Windows 11 23H2" CVE-2024-21305,Hypervisor-Protected Code Integrity (HVCI) Security Feature Bypass Vulnerability,4.4,CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N,"Microsoft Windows 11 22H2, Microsoft Windows 10 21H2, Microsoft Windows 11 21H2, Microsoft Windows 10 22H2, Microsoft Windows 10 1809, Microsoft Windows Server 2022 23H2, Microsoft Windows Server 2022, Microsoft Windows Server 2019, Microsoft Windows 11 23H2" CVE-2024-21306,Microsoft Bluetooth Driver Spoofing Vulnerability,5.7,CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N,"Microsoft Windows 11 22H2, Microsoft Windows 10 21H2, Microsoft Windows 11 21H2, Microsoft Windows 10 22H2, Microsoft Windows Server 2022 23H2, Microsoft Windows Server 2022, Microsoft Windows 11 23H2" CVE-2024-21307,Remote Desktop Client Remote Code Execution Vulnerability,7.5,CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H,"Microsoft Windows 11 22H2, Microsoft Windows 10 21H2, Microsoft Windows Server 2008 r2, Microsoft Windows 11 21H2, Microsoft Windows 10 1507, Microsoft Windows 10 22H2, Microsoft Windows 10 1809, Microsoft Windows Server 2012, Microsoft Windows Server 2019, Microsoft Windows 10 1607, Microsoft Windows Server 2016, Microsoft Windows Server 2022, Microsoft Windows Server 2012 r2, Microsoft Windows 11 23H2" CVE-2024-21309,Windows Kernel-Mode Driver Elevation of Privilege Vulnerability,7.8,CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,"Microsoft Windows 11 22H2, Microsoft Windows Server 2022, Microsoft Windows 11 21H2, Microsoft Windows 11 23H2" CVE-2024-21310,Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability,7.8,CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,"Microsoft Windows 11 22H2, Microsoft Windows 10 21H2, Microsoft Windows 11 21H2, Microsoft Windows 10 22H2, Microsoft Windows 10 1809, Microsoft Windows Server 2022 23H2, Microsoft Windows Server 2019, Microsoft Windows 11 23H2" CVE-2024-21311,Windows Cryptographic Services Information Disclosure Vulnerability,5.5,CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N,"Microsoft Windows 11 22H2, Microsoft Windows 10 21H2, Microsoft Windows Server 2008 r2, Microsoft Windows 11 21H2, Microsoft Windows 10 1507, Microsoft Windows 10 22H2, Microsoft Windows 10 1809, Microsoft Windows Server 2008, Microsoft Windows Server 2012, Microsoft Windows Server 2019, Microsoft Windows Server 2022 23H2, Microsoft Windows 10 1607, Microsoft Windows Server 2016, Microsoft Windows Server 2022, Microsoft Windows Server 2012 r2, Microsoft Windows 11 23H2" CVE-2024-21312,.NET Framework Denial of Service Vulnerability,7.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,"Microsoft Windows 11 22H2, Microsoft Windows 10 21H2, Microsoft Windows Server 2008 r2, Microsoft Windows 11 21H2, Microsoft Windows 10 22H2, Microsoft Windows 10 1809, Microsoft Windows Server 2012, Microsoft Windows Server 2019, Microsoft Windows 10 1607, Microsoft Windows Server 2016, Microsoft Windows Server 2022, Microsoft Windows Server 2012 r2, Microsoft Windows 11 23H2" CVE-2024-21313,Windows TCP/IP Information Disclosure Vulnerability,5.3,CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N,"Microsoft Windows 11 22H2, Microsoft Windows 10 21H2, Microsoft Windows Server 2008 r2, Microsoft Windows 11 21H2, Microsoft Windows 10 1507, Microsoft Windows 10 22H2, Microsoft Windows 10 1809, Microsoft Windows Server 2008, Microsoft Windows Server 2012, Microsoft Windows Server 2019, Microsoft Windows Server 2022 23H2, Microsoft Windows 10 1607, Microsoft Windows Server 2016, Microsoft Windows Server 2022, Microsoft Windows Server 2012 r2, Microsoft Windows 11 23H2" CVE-2024-21314,Microsoft Message Queuing Information Disclosure Vulnerability,6.5,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N,"Microsoft Windows 11 22H2, Microsoft Windows 10 21H2, Microsoft Windows Server 2008 r2, Microsoft Windows 11 21H2, Microsoft Windows 10 1507, Microsoft Windows 10 22H2, Microsoft Windows 10 1809, Microsoft Windows Server 2008, Microsoft Windows Server 2012, Microsoft Windows Server 2019, Microsoft Windows Server 2022 23H2, Microsoft Windows 10 1607, Microsoft Windows Server 2016, Microsoft Windows Server 2022, Microsoft Windows Server 2012 r2, Microsoft Windows 11 23H2" CVE-2024-21316,Windows Server Key Distribution Service Security Feature Bypass,6.1,CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:N,"Microsoft Windows 11 22H2, Microsoft Windows 10 21H2, Microsoft Windows 11 21H2, Microsoft Windows 10 22H2, Microsoft Windows 10 1809, Microsoft Windows Server 2022 23H2, Microsoft Windows 10 1607, Microsoft Windows Server 2022, Microsoft Windows Server 2019, Microsoft Windows 11 23H2" CVE-2024-21318,Microsoft SharePoint Server Remote Code Execution Vulnerability,8.8,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,N/A CVE-2024-21320,Windows Themes Spoofing Vulnerability,6.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N,"Microsoft Windows 11 22H2, Microsoft Windows 10 21H2, Microsoft Windows 11 21H2, Microsoft Windows 10 1507, Microsoft Windows 10 22H2, Microsoft Windows 10 1809, Microsoft Windows Server 2012, Microsoft Windows Server 2019, Microsoft Windows 10 1607, Microsoft Windows Server 2016, Microsoft Windows Server 2022, Microsoft Windows Server 2012 r2, Microsoft Windows 11 23H2" CVE-2024-21325,Microsoft Printer Metadata Troubleshooter Tool Remote Code Execution Vulnerability,7.8,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,N/A CVE-2024-0341,A vulnerability was found in Inis up to 2.0.1. It has been rated as problematic. This issue affects some unknown processing of the file /app/api/controller/default/File.php of the component GET Request Handler. The manipulation of the argument path leads to path traversal: '../filedir'. The exploit has been disclosed to the public and may be used. The identifier VDB-250109 was assigned to this vulnerability.,3.5,CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N,N/A CVE-2024-21319,Microsoft Identity Denial of service vulnerability,6.8,CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H,N/A CVE-2024-21668,"react-native-mmkv is a library that allows easy use of MMKV inside React Native applications. Before version 2.11.0, the react-native-mmkv logged the optional encryption key for the MMKV database into the Android system log. The key can be obtained by anyone with access to the Android Debugging Bridge (ADB) if it is enabled in the phone settings. This bug is not present on iOS devices. By logging the encryption secret to the system logs, attackers can trivially recover the secret by enabling ADB and undermining an app's thread model. This issue has been patched in version 2.11.0.",4.4,CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N,N/A CVE-2023-7032," A CWE-502: Deserialization of untrusted data vulnerability exists that could allow an attacker logged in with a user level account to gain higher privileges by providing a harmful serialized object. ",7.8,CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,N/A CVE-2024-0342,A vulnerability classified as critical has been found in Inis up to 2.0.1. Affected is an unknown function of the file /app/api/controller/default/Sqlite.php. The manipulation of the argument sql leads to sql injection. The exploit has been disclosed to the public and may be used. VDB-250110 is the identifier assigned to this vulnerability.,6.3,CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L,N/A CVE-2024-0343,A vulnerability classified as problematic was found in CodeAstro Simple House Rental System 5.6. Affected by this vulnerability is an unknown functionality of the component Login Panel. The manipulation leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-250111.,4.3,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N,N/A CVE-2024-21664,"jwx is a Go module implementing various JWx (JWA/JWE/JWK/JWS/JWT, otherwise known as JOSE) technologies. Calling `jws.Parse` with a JSON serialized payload where the `signature` field is present while `protected` is absent can lead to a nil pointer dereference. The vulnerability can be used to crash/DOS a system doing JWS verification. This vulnerability has been patched in versions 2.0.19 and 1.2.28. ",4.3,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L,N/A CVE-2024-0344,"A vulnerability, which was classified as critical, has been found in soxft TimeMail up to 1.1. Affected by this issue is some unknown functionality of the file check.php. The manipulation of the argument c leads to sql injection. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-250112.",5.5,CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L,N/A CVE-2024-0345,"A vulnerability, which was classified as problematic, was found in CodeAstro Vehicle Booking System 1.0. This affects an unknown part of the file usr/usr-register.php of the component User Registration. The manipulation of the argument Full_Name/Last_Name/Address with the input leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-250113 was assigned to this vulnerability.",4.3,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N,N/A CVE-2023-38827,Cross Site Scripting vulnerability in Follet School Solutions Destiny v.20_0_1_AU4 and later allows a remote attacker to run arbitrary code via presentonesearchresultsform.do.,6.1,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N,N/A CVE-2023-50136,Cross Site Scripting (XSS) vulnerability in JFinalcms 5.0.0 allows attackers to run arbitrary code via the name field when creating a new custom table.,5.4,CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N,N/A CVE-2023-5770,"Proofpoint Enterprise Protection contains a vulnerability in the email delivery agent that allows an unauthenticated attacker to inject improperly encoded HTML into the email body of a message through the email subject. The vulnerability is caused by inappropriate encoding when rewriting the email before delivery.This issue affects Proofpoint Enterprise Protection: from 8.20.2 before patch 4809, from 8.20.0 before patch 4805, from 8.18.6 before patch 4804 and all other prior versions. ",5.3,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N,N/A CVE-2023-6476,"A flaw was found in CRI-O that involves an experimental annotation leading to a container being unconfined. This may allow a pod to specify and get any amount of memory/cpu, circumventing the kubernetes scheduler and potentially resulting in a denial of service in the node.",6.5,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H,"Redhat Enterprise Linux 9.0, Redhat Enterprise Linux 8.0" CVE-2024-0346,A vulnerability has been found in CodeAstro Vehicle Booking System 1.0 and classified as problematic. This vulnerability affects unknown code of the file usr/user-give-feedback.php of the component Feedback Page. The manipulation of the argument My Testemonial leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-250114 is the identifier assigned to this vulnerability.,3.5,CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N,N/A CVE-2024-0347,A vulnerability was found in SourceCodester Engineers Online Portal 1.0 and classified as problematic. This issue affects some unknown processing of the file signup_teacher.php. The manipulation of the argument Password leads to weak password requirements. The attack may be initiated remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-250115.,3.7,CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N,N/A CVE-2024-0348,A vulnerability was found in SourceCodester Engineers Online Portal 1.0. It has been classified as problematic. Affected is an unknown function of the component File Upload Handler. The manipulation leads to resource consumption. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-250116.,4.3,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L,N/A CVE-2023-34332," AMI’s SPx contains a vulnerability in the BMC where an Attacker may cause an untrusted pointer to dereference by a local network. A successful exploitation of this vulnerability may lead to a loss of confidentiality, integrity, and/or availability. ",7.8,CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,Ami Megarac Sp-X CVE-2023-34333," AMI’s SPx contains a vulnerability in the BMC where an Attacker may cause an untrusted pointer to dereference via a local network. A successful exploitation of this vulnerability may lead to a loss of confidentiality, integrity, and/or availability. ",7.8,CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,Ami Megarac Sp-X CVE-2023-37293,"AMI’s SPx contains a vulnerability in the BMC where an Attacker may cause a stack-based buffer overflow via an adjacent network. A successful exploitation of this vulnerability may lead to a loss of confidentiality, integrity, and/or availability. ",9.6,CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H,Ami Megarac Sp-X CVE-2023-37294," AMI’s SPx contains a vulnerability in the BMC where an Attacker may cause a heap memory corruption via an adjacent network. A successful exploitation of this vulnerability may lead to a loss of confidentiality, integrity, and/or availability. ",8.3,CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H,Ami Megarac Sp-X CVE-2023-37295," AMI’s SPx contains a vulnerability in the BMC where an Attacker may cause a heap memory corruption via an adjacent network. A successful exploitation of this vulnerability may lead to a loss of confidentiality, integrity, and/or availability. ",8.3,CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H,Ami Megarac Sp-X CVE-2023-37296," AMI’s SPx contains a vulnerability in the BMC where an Attacker may cause a stack memory corruption via an adjacent network. A successful exploitation of this vulnerability may lead to a loss of confidentiality, integrity, and/or availability. ",8.3,CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H,Ami Megarac Sp-X CVE-2023-37297," AMI’s SPx contains a vulnerability in the BMC where an Attacker may cause a heap memory corruption via an adjacent network. A successful exploitation of this vulnerability may lead to a loss of confidentiality, integrity, and/or availability. ",8.3,CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H,Ami Megarac Sp-X CVE-2023-3043," AMI’s SPx contains a vulnerability in the BMC where an Attacker may cause a stack-based buffer overflow via an adjacent network. A successful exploitation of this vulnerability may lead to a loss of confidentiality, integrity, and/or availability. ",9.6,CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H,Ami Megarac Sp-X CVE-2023-47992,"An integer overflow vulnerability in FreeImageIO.cpp::_MemoryReadProc in FreeImage 3.18.0 allows attackers to obtain sensitive information, cause a denial-of-service attacks and/or run arbitrary code.",8.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,N/A CVE-2023-47993,A Buffer out-of-bound read vulnerability in Exif.cpp::ReadInt32 in FreeImage 3.18.0 allows attackers to cause a denial-of-service.,6.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H,N/A CVE-2023-47994,"An integer overflow vulnerability in LoadPixelDataRLE4 function in PluginBMP.cpp in Freeimage 3.18.0 allows attackers to obtain sensitive information, cause a denial of service and/or run arbitrary code.",8.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,N/A CVE-2023-47995,Memory Allocation with Excessive Size Value discovered in BitmapAccess.cpp::FreeImage_AllocateBitmap in FreeImage 3.18.0 allows attackers to cause a denial of service.,6.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H,N/A CVE-2023-47996,An integer overflow vulnerability in Exif.cpp::jpeg_read_exif_dir in FreeImage 3.18.0 allows attackers to obtain information and cause a denial of service.,6.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H,N/A CVE-2024-0349,A vulnerability was found in SourceCodester Engineers Online Portal 1.0. It has been declared as problematic. Affected by this vulnerability is an unknown functionality. The manipulation leads to sensitive cookie without secure attribute. The attack can be launched remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. The identifier VDB-250117 was assigned to this vulnerability.,3.7,CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N,N/A CVE-2024-0350,A vulnerability was found in SourceCodester Engineers Online Portal 1.0. It has been rated as problematic. Affected by this issue is some unknown functionality. The manipulation leads to session expiration. The attack may be launched remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. VDB-250118 is the identifier assigned to this vulnerability.,3.1,CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N,N/A CVE-2024-0351,A vulnerability classified as problematic has been found in SourceCodester Engineers Online Portal 1.0. This affects an unknown part. The manipulation leads to session fixiation. It is possible to initiate the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-250119.,3.1,CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N,N/A CVE-2024-0352,A vulnerability classified as critical was found in Likeshop up to 2.5.7.20210311. This vulnerability affects the function FileServer::userFormImage of the file server/application/api/controller/File.php of the component HTTP POST Request Handler. The manipulation of the argument file leads to unrestricted upload. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-250120.,7.3,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L,N/A CVE-2023-47997,An issue discovered in BitmapAccess.cpp::FreeImage_AllocateBitmap in FreeImage 3.18.0 leads to an infinite loop and allows attackers to cause a denial of service.,6.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H,N/A CVE-2024-0354,"A vulnerability, which was classified as critical, has been found in unknown-o download-station up to 1.1.8. This issue affects some unknown processing of the file index.php. The manipulation of the argument f leads to path traversal: '../filedir'. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-250121 was assigned to this vulnerability.",5.3,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N,N/A CVE-2024-0355,"A vulnerability, which was classified as critical, was found in PHPGurukul Dairy Farm Shop Management System up to 1.1. Affected is an unknown function of the file add-category.php. The manipulation of the argument category leads to sql injection. The exploit has been disclosed to the public and may be used. VDB-250122 is the identifier assigned to this vulnerability.",5.5,CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L,N/A CVE-2024-0356,A vulnerability has been found in Mandelo ssm_shiro_blog 1.0 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file updateRoles of the component Backend. The manipulation leads to improper access controls. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-250123.,4.3,CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N,N/A CVE-2024-0357,A vulnerability was found in coderd-repos Eva 1.0.0 and classified as critical. Affected by this issue is some unknown functionality of the file /system/traceLog/page of the component HTTP POST Request Handler. The manipulation of the argument property leads to sql injection. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-250124.,5.5,CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L,N/A CVE-2024-0358,A vulnerability was found in DeShang DSO2O up to 4.1.0. It has been classified as critical. This affects an unknown part of the file /install/install.php. The manipulation leads to improper access controls. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-250125 was assigned to this vulnerability.,5.3,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N,N/A CVE-2024-0359,A vulnerability was found in code-projects Simple Online Hotel Reservation System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file login.php. The manipulation of the argument username/password leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-250126 is the identifier assigned to this vulnerability.,7.3,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L,N/A CVE-2024-0360,A vulnerability was found in PHPGurukul Hospital Management System 1.0. It has been rated as critical. This issue affects some unknown processing of the file admin/edit-doctor-specialization.php. The manipulation of the argument doctorspecilization leads to sql injection. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-250127.,5.5,CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L,N/A CVE-2023-31446,"In Cassia Gateway firmware XC1000_2.1.1.2303082218 and XC2000_2.1.1.2303090947, the queueUrl parameter in /bypass/config is not sanitized. This leads to injecting Bash code and executing it with root privileges on device startup.",9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,"Cassianetworks Xc2000 Firmware 2.1.1.2303090947, Cassianetworks Xc1000 Firmware 2.1.1.2303082218" CVE-2024-0361,A vulnerability classified as critical has been found in PHPGurukul Hospital Management System 1.0. Affected is an unknown function of the file admin/contact.php. The manipulation of the argument mobnum leads to sql injection. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-250128.,5.5,CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L,N/A CVE-2024-0362,A vulnerability classified as critical was found in PHPGurukul Hospital Management System 1.0. Affected by this vulnerability is an unknown functionality of the file admin/change-password.php. The manipulation of the argument cpass leads to sql injection. The exploit has been disclosed to the public and may be used. The identifier VDB-250129 was assigned to this vulnerability.,5.5,CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L,N/A CVE-2024-0363,"A vulnerability, which was classified as critical, has been found in PHPGurukul Hospital Management System 1.0. Affected by this issue is some unknown functionality of the file admin/patient-search.php. The manipulation of the argument searchdata leads to sql injection. The exploit has been disclosed to the public and may be used. VDB-250130 is the identifier assigned to this vulnerability.",5.5,CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L,N/A CVE-2024-0364,"A vulnerability, which was classified as critical, was found in PHPGurukul Hospital Management System 1.0. This affects an unknown part of the file admin/query-details.php. The manipulation of the argument adminremark leads to sql injection. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-250131.",5.5,CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L,N/A CVE-2024-21643,"IdentityModel Extensions for .NET provide assemblies for web developers that wish to use federated identity providers for establishing the caller's identity. Anyone leveraging the `SignedHttpRequest`protocol or the `SignedHttpRequestValidator`is vulnerable. Microsoft.IdentityModel trusts the `jku`claim by default for the `SignedHttpRequest`protocol. This raises the possibility to make any remote or local `HTTP GET` request. The vulnerability has been fixed in Microsoft.IdentityModel.Protocols.SignedHttpRequest. Users should update all their Microsoft.IdentityModel versions to 7.1.2 (for 7x) or higher, 6.34.0 (for 6x) or higher.",7.1,CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L,N/A CVE-2023-41781," There is a Cross-site scripting (XSS)  vulnerability in ZTE MF258. Due to insufficient input validation of SMS interface parameter, an XSS attack will be triggered. ",5.7,CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:L/A:L,"Zte Mf258 Firmware zte_std_v1.0.0b10, Zte Mf258 Firmware zte_std_v1.0.0b08" CVE-2022-46025,"Totolink N200RE_V5 V9.3.5u.6255_B20211224 is vulnerable to Incorrect Access Control. The device allows remote attackers to obtain Wi-Fi system information, such as Wi-Fi SSID and Wi-Fi password, without logging into the management page.",9.1,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N,Totolink N200Re V5 Firmware 9.3.5u.6255_b20211224 CVE-2023-41603,D-Link R15 before v1.08.02 was discovered to contain no firewall restrictions for IPv6 traffic. This allows attackers to arbitrarily access any services running on the device that may be inadvertently listening via IPv6.,5.3,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N,Dlink R15 Firmware CVE-2023-48864,SEMCMS v4.8 was discovered to contain a SQL injection vulnerability via the languageID parameter in /web_inc.php.,7.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,N/A CVE-2020-26627,A Time-Based SQL Injection vulnerability was discovered in Hospital Management System V4.0 which can allow an attacker to dump database information via a crafted payload entered into the 'Admin Remark' parameter under the 'Contact Us Queries -> Unread Query' tab.,4.9,CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N,N/A CVE-2020-26628,"A Cross-Site Scripting (XSS) vulnerability was discovered in Hospital Management System V4.0 which allows an attacker to execute arbitrary web scripts or HTML code via a malicious payload appended to a username on the 'Edit Profile"" page and triggered by another user visiting the profile.",6.1,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N,N/A CVE-2020-26629,A JQuery Unrestricted Arbitrary File Upload vulnerability was discovered in Hospital Management System V4.0 which allows an unauthenticated attacker to upload any file to the server.,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,N/A CVE-2020-26630,A Time-Based SQL Injection vulnerability was discovered in Hospital Management System V4.0 which can allow an attacker to dump database information via a special payload in the 'Doctor Specialization' field under the 'Go to Doctors' tab after logging in as an admin.,4.9,CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N,N/A CVE-2023-49394,"Zentao versions 4.1.3 and before has a URL redirect vulnerability, which prevents the system from functioning properly.",6.1,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N,N/A CVE-2023-49427,"Buffer Overflow vulnerability in Tenda AX12 V22.03.01.46, allows remote attackers to cause a denial of service (DoS) via list parameter in SetNetControlList function.",7.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,Tenda Ax12 Firmware 22.03.01.46 CVE-2023-49471,"Blind Server-Side Request Forgery (SSRF) vulnerability in karlomikus Bar Assistant before version 3.2.0 does not validate a parameter before making a request through Image::make(), which could allow authenticated remote attackers to execute arbitrary code.",8.8,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,N/A CVE-2023-49619,"Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') vulnerability in Apache Answer. This issue affects Apache Answer: through 1.2.0. Under normal circumstances, a user can only bookmark a question once, and will only increase the number of questions bookmarked once. However, repeat submissions through the script can increase the number of collection of the question many times. Users are recommended to upgrade to version [1.2.1], which fixes the issue.",3.1,CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N,N/A CVE-2023-50120,MP4Box GPAC version 2.3-DEV-rev636-gfbd7e13aa-master was discovered to contain an infinite loop in the function av1_uvlc at media_tools/av_parsers.c. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted MP4 file.,5.5,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H,N/A CVE-2023-51252,"PublicCMS 4.0 is vulnerable to Cross Site Scripting (XSS). Because files can be uploaded and online preview function is provided, pdf files and html files containing malicious code are uploaded, an XSS popup window is realized through online viewing.",5.4,CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N,N/A CVE-2023-48242,The vulnerability allows an authenticated remote attacker to download arbitrary files in all paths of the system under the context of the application OS user (“root”) via a crafted HTTP request.,6.5,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N,Bosch Nexo-Os CVE-2023-48243,"The vulnerability allows a remote attacker to upload arbitrary files in all paths of the system under the context of the application OS user (“root”) via a crafted HTTP request. By abusing this vulnerability, it is possible to obtain remote code execution (RCE) with root privileges on the device.",8.1,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H,Bosch Nexo-Os CVE-2023-48244,The vulnerability allows a remote attacker to inject and execute arbitrary client-side script code inside a victim’s session via a crafted URL or HTTP request.,5.3,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L,Bosch Nexo-Os CVE-2023-48245,The vulnerability allows an unauthenticated remote attacker to upload arbitrary files under the context of the application OS user (“root”) via a crafted HTTP request.,6.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L,Bosch Nexo-Os CVE-2023-48246,The vulnerability allows a remote attacker to download arbitrary files in all paths of the system under the context of the application OS user (“root”) via a crafted HTTP request.,6.5,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N,Bosch Nexo-Os CVE-2023-48247,The vulnerability allows an unauthenticated remote attacker to read arbitrary files under the context of the application OS user (“root”) via a crafted HTTP request.,5.3,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N,Bosch Nexo-Os CVE-2023-48248,"The vulnerability allows an authenticated remote attacker to upload a malicious file to the SD card containing arbitrary client-side script code and obtain its execution inside a victim’s session via a crafted URL, HTTP request, or simply by waiting for the victim to view the poisoned file.",5.5,CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L,Bosch Nexo-Os CVE-2023-48249,"The vulnerability allows an authenticated remote attacker to list arbitrary folders in all paths of the system under the context of the application OS user (“root”) via a crafted HTTP request. By abusing this vulnerability, it is possible to steal session cookies of other active users.",6.5,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N,Bosch Nexo-Os CVE-2023-48250,The vulnerability allows a remote attacker to authenticate to the web application with high privileges through multiple hidden hard-coded accounts.,8.1,CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H,Bosch Nexo-Os CVE-2024-0310," A content-security-policy vulnerability in ENS Control browser extension prior to 10.7.0 Update 15 allows a remote attacker to alter the response header parameter setting to switch the content security policy into report-only mode, allowing an attacker to bypass the content-security-policy configuration. ",6.1,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N,Microsoft Windows CVE-2023-48251,The vulnerability allows a remote attacker to authenticate to the SSH service with root privileges through a hidden hard-coded account.,8.1,CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H,Bosch Nexo-Os CVE-2023-48252,The vulnerability allows an authenticated remote attacker to perform actions exceeding their authorized access via crafted HTTP requests.,8.8,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,Bosch Nexo-Os CVE-2023-48253,"The vulnerability allows a remote authenticated attacker to read or update arbitrary content of the authentication database via a crafted HTTP request. By abusing this vulnerability it is possible to exfiltrate other users’ password hashes or update them with arbitrary values and access their accounts.",8.8,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,Bosch Nexo-Os CVE-2023-48254,The vulnerability allows a remote attacker to inject and execute arbitrary client-side script code inside a victim’s session via a crafted URL or HTTP request.,5.3,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L,Bosch Nexo-Os CVE-2023-48255,"The vulnerability allows an unauthenticated remote attacker to send malicious network requests containing arbitrary client-side script code and obtain its execution inside a victim’s session via a crafted URL, HTTP request, or simply by waiting for the victim to view the poisoned log.",6.3,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L,Bosch Nexo-Os CVE-2023-48256,The vulnerability allows a remote attacker to inject arbitrary HTTP response headers or manipulate HTTP response bodies inside a victim’s session via a crafted URL or HTTP request.,5.3,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L,Bosch Nexo-Os CVE-2023-48257,"The vulnerability allows a remote attacker to access sensitive data inside exported packages or obtain up to Remote Code Execution (RCE) with root privileges on the device. The vulnerability can be exploited directly by authenticated users, via crafted HTTP requests, or indirectly by unauthenticated users, by accessing already-exported backup packages, or crafting an import package and inducing an authenticated victim into sending the HTTP upload request.",7.8,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,Bosch Nexo-Os CVE-2023-48258,"The vulnerability allows a remote attacker to delete arbitrary files on the file system via a crafted URL or HTTP request through a victim’s session.",5.5,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H,Bosch Nexo-Os CVE-2023-48259,The vulnerability allows a remote unauthenticated attacker to read arbitrary content of the results database via a crafted HTTP request.,5.3,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N,Bosch Nexo-Os CVE-2023-48260,The vulnerability allows a remote unauthenticated attacker to read arbitrary content of the results database via a crafted HTTP request.,5.3,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N,Bosch Nexo-Os CVE-2023-48261,The vulnerability allows a remote unauthenticated attacker to read arbitrary content of the results database via a crafted HTTP request.,5.3,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N,Bosch Nexo-Os CVE-2023-48262,"The vulnerability allows an unauthenticated remote attacker to perform a Denial-of-Service (DoS) attack or, possibly, obtain Remote Code Execution (RCE) via a crafted network request.",8.1,CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H,Bosch Nexo-Os CVE-2023-48263,"The vulnerability allows an unauthenticated remote attacker to perform a Denial-of-Service (DoS) attack or, possibly, obtain Remote Code Execution (RCE) via a crafted network request.",8.1,CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H,Bosch Nexo-Os CVE-2023-48264,"The vulnerability allows an unauthenticated remote attacker to perform a Denial-of-Service (DoS) attack or, possibly, obtain Remote Code Execution (RCE) via a crafted network request.",8.1,CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H,Bosch Nexo-Os CVE-2023-48265,"The vulnerability allows an unauthenticated remote attacker to perform a Denial-of-Service (DoS) attack or, possibly, obtain Remote Code Execution (RCE) via a crafted network request.",8.1,CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H,Bosch Nexo-Os CVE-2023-48266,"The vulnerability allows an unauthenticated remote attacker to perform a Denial-of-Service (DoS) attack or, possibly, obtain Remote Code Execution (RCE) via a crafted network request.",8.1,CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H,Bosch Nexo-Os CVE-2023-51971,Tenda AX1803 v1.0.0.1 contains a stack overflow via the adv.iptv.stbpvid parameter in the function getIptvInfo.,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,Tenda Ax1803 Firmware 1.0.0.1 CVE-2023-51972,Tenda AX1803 v1.0.0.1 was discovered to contain a command injection vulnerability via the function fromAdvSetLanIp.,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,Tenda Ax1803 Firmware 1.0.0.1 CVE-2023-5455,"A Cross-site request forgery vulnerability exists in ipa/session/login_password in all supported versions of IPA. This flaw allows an attacker to trick the user into submitting a request that could perform actions as the user, resulting in a loss of confidentiality and system integrity. During community penetration testing it was found that for certain HTTP end-points FreeIPA does not ensure CSRF protection. Due to implementation details one cannot use this flaw for reflection of a cookie representing already logged-in user. An attacker would always have to go through a new authentication attempt.",6.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N,"Redhat Enterprise Linux Server Update Services For Sap Solutions 8.6, Redhat Enterprise Linux Eus 8.6, Redhat Enterprise Linux Server Aus 8.6, Redhat Enterprise Linux Server Aus 9.2, Redhat Enterprise Linux For Arm 64 Eus 8.8, Redhat Enterprise Linux Server Tus 8.4, Redhat Enterprise Linux Server 9.2, Redhat Enterprise Linux For Power Little Endian Eus 9.0, Redhat Enterprise Linux Server 9.0, Redhat Enterprise Linux Server Aus 8.2, Redhat Enterprise Linux Server For Ibm Z Systems 9.2, Redhat Enterprise Linux For Ibm Z Systems Eus 9.2, Redhat Enterprise Linux For Ibm Z Systems Eus 9.0, Redhat Enterprise Linux Server Aus 8.4, Redhat Enterprise Linux 9.0, Redhat Enterprise Linux Server Update Services For Sap Solutions 9.2, Redhat Enterprise Linux For Power Little Endian 9.0, Redhat Enterprise Linux For Ibm Z Systems Eus 8.6, Redhat Enterprise Linux Update Services For Sap Solutions 9.2, Redhat Enterprise Linux Server For Power Little Endian Update Services For Sap Solutions 8.6, Redhat Enterprise Linux For Power Little Endian 8.0, Redhat Enterprise Linux For Ibm Z Systems 9.0, Redhat Enterprise Linux For Power Little Endian Eus 9.2, Redhat Enterprise Linux Eus 9.2, Redhat Enterprise Linux Server For Power Little Endian Update Services For Sap Solutions 8.4, Fedoraproject Fedora 39, Fedoraproject Fedora 38, Redhat Enterprise Linux Desktop 7.0, Redhat Enterprise Linux 7.0, Redhat Enterprise Linux Server Update Services For Sap Solutions 9.0, Redhat Enterprise Linux For Ibm Z Systems 8.0, Redhat Enterprise Linux Eus 8.8, Redhat Enterprise Linux 8.0, Fedoraproject Fedora 40, Redhat Enterprise Linux Server For Power Little Endian Update Services For Sap Solutions 8.2, Redhat Enterprise Linux Server Tus 8.2, Redhat Enterprise Linux Server Update Services For Sap Solutions 8.2, Redhat Enterprise Linux Update Services For Sap Solutions 9.0, Redhat Enterprise Linux For Arm 64 Eus 9.0, Redhat Enterprise Linux 8.4, Redhat Enterprise Linux For Power Big Endian 7.0, Redhat Enterprise Linux For Power Little Endian Eus 8.8, Redhat Enterprise Linux For Arm 64 Eus 9.2, Redhat Enterprise Linux Eus 9.0, Redhat Enterprise Linux For Scientific Computing 7.0, Redhat Enterprise Linux For Ibm Z Systems 7.0, Redhat Enterprise Linux For Power Little Endian 7.0, Redhat Enterprise Linux Server Tus 8.6, Redhat Enterprise Linux Workstation 7.0, Redhat Enterprise Linux For Ibm Z Systems Eus 8.8, Redhat Enterprise Linux For Power Little Endian Eus 8.6" CVE-2024-20710,Adobe Substance 3D Stager versions 2.1.3 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.,5.5,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N,"Microsoft Windows, Apple Macos" CVE-2024-20711,Adobe Substance 3D Stager versions 2.1.3 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.,5.5,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N,"Microsoft Windows, Apple Macos" CVE-2024-20712,Adobe Substance 3D Stager versions 2.1.3 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.,5.5,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N,"Microsoft Windows, Apple Macos" CVE-2024-20713,Adobe Substance 3D Stager versions 2.1.3 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.,5.5,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N,"Microsoft Windows, Apple Macos" CVE-2024-20714,Adobe Substance 3D Stager versions 2.1.3 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.,5.5,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N,"Microsoft Windows, Apple Macos" CVE-2024-20715,Adobe Substance 3D Stager versions 2.1.3 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.,5.5,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N,"Microsoft Windows, Apple Macos" CVE-2023-51961,Tenda AX1803 v1.0.0.1 contains a stack overflow via the adv.iptv.stballvlans parameter in the function formGetIptv.,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,Tenda Ax1803 Firmware 1.0.0.1 CVE-2023-51966,Tenda AX1803 v1.0.0.1 contains a stack overflow via the adv.iptv.stballvlans parameter in the function setIptvInfo.,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,Tenda Ax1803 Firmware 1.0.0.1 CVE-2024-0389,"A vulnerability, which was classified as critical, was found in SourceCodester Student Attendance System 1.0. Affected is an unknown function of the file attendance_report.php. The manipulation of the argument class_id leads to sql injection. The exploit has been disclosed to the public and may be used. VDB-250230 is the identifier assigned to this vulnerability.",6.3,CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L,N/A CVE-2023-51952,Tenda AX1803 v1.0.0.1 contains a stack overflow via the adv.iptv.stbpvid parameter in the function formSetIptv.,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,Tenda Ax1803 Firmware 1.0.0.1 CVE-2023-51953,Tenda AX1803 v1.0.0.1 contains a stack overflow via the iptv.stb.mode parameter in the function formSetIptv.,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,Tenda Ax1803 Firmware 1.0.0.1 CVE-2023-51954,Tenda AX1803 v1.0.0.1 contains a stack overflow via the iptv.stb.port parameter in the function formSetIptv.,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,Tenda Ax1803 Firmware 1.0.0.1 CVE-2023-51955,Tenda AX1803 v1.0.0.1 contains a stack overflow via the adv.iptv.stballvlans parameter in the function formSetIptv.,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,Tenda Ax1803 Firmware 1.0.0.1 CVE-2023-51956,Tenda AX1803 v1.0.0.1 contains a stack overflow via the iptv.city.vlan parameter in the function formSetIptv,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,Tenda Ax1803 Firmware 1.0.0.1 CVE-2023-51957,Tenda AX1803 v1.0.0.1 contains a stack overflow via the iptv.stb.mode parameter in the function formGetIptv.,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,Tenda Ax1803 Firmware 1.0.0.1 CVE-2023-51958,Tenda AX1803 v1.0.0.1 contains a stack overflow via the iptv.stb.port parameter in the function formGetIptv.,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,Tenda Ax1803 Firmware 1.0.0.1 CVE-2023-51959,Tenda AX1803 v1.0.0.1 contains a stack overflow via the adv.iptv.stbpvid parameter in the function formGetIptv.,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,Tenda Ax1803 Firmware 1.0.0.1 CVE-2023-51960,Tenda AX1803 v1.0.0.1 contains a stack overflow via the iptv.city.vlan parameter in the function formGetIptv.,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,Tenda Ax1803 Firmware 1.0.0.1 CVE-2023-51963,Tenda AX1803 v1.0.0.1 contains a stack overflow via the iptv.city.vlan parameter in the function setIptvInfo.,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,Tenda Ax1803 Firmware 1.0.0.1 CVE-2023-51964,Tenda AX1803 v1.0.0.1 contains a stack overflow via the iptv.stb.port parameter in the function setIptvInfo.,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,Tenda Ax1803 Firmware 1.0.0.1 CVE-2023-51965,Tenda AX1803 v1.0.0.1 contains a stack overflow via the adv.iptv.stbpvid parameter in the function setIptvInfo.,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,Tenda Ax1803 Firmware 1.0.0.1 CVE-2023-6158,"The EventON - WordPress Virtual Event Calendar Plugin plugin for WordPress is vulnerable to unauthorized modification of data and loss of data due to a missing capability check on the evo_eventpost_update_meta function in all versions up to, and including, 4.5.4 (for Pro) and 2.2.7 (for free). This makes it possible for unauthenticated attackers to update and remove arbitrary post metadata. Note that certain parameters may allow for content injection.",6.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L,N/A CVE-2023-41056,Redis is an in-memory database that persists on disk. Redis incorrectly handles resizing of memory buffers which can result in integer overflow that leads to heap overflow and potential remote code execution. This issue has been patched in version 7.0.15 and 7.2.4.,8.1,CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H,"Fedoraproject Fedora 39, Fedoraproject Fedora 38" CVE-2023-45139,"fontTools is a library for manipulating fonts, written in Python. The subsetting module has a XML External Entity Injection (XXE) vulnerability which allows an attacker to resolve arbitrary entities when a candidate font (OT-SVG fonts), which contains a SVG table, is parsed. This allows attackers to include arbitrary files from the filesystem fontTools is running on or make web requests from the host system. This vulnerability has been patched in version 4.43.0.",7.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,N/A CVE-2023-47171,An information disclosure vulnerability exists in the aVideoEncoder.json.php chunkFile path functionality of WWBN AVideo 11.6 and dev master commit 15fed957fb. A specially crafted HTTP request can lead to arbitrary file read.,6.5,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N,N/A CVE-2023-47861,A cross-site scripting (xss) vulnerability exists in the channelBody.php user name functionality of WWBN AVideo 11.6 and dev master commit 15fed957fb. A specially crafted HTTP request can lead to arbitrary Javascript execution. An attacker can get a user to visit a webpage to trigger this vulnerability.,9.0,CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H,N/A CVE-2023-47862,A local file inclusion vulnerability exists in the getLanguageFromBrowser functionality of WWBN AVideo dev master commit 15fed957fb. A specially crafted HTTP request can lead to arbitrary code execution. An attacker can send a series of HTTP requests to trigger this vulnerability.,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,N/A CVE-2023-48728,A cross-site scripting (xss) vulnerability exists in the functiongetOpenGraph videoName functionality of WWBN AVideo 11.6 and dev master commit 3c6bb3ff. A specially crafted HTTP request can lead to arbitrary Javascript execution. An attacker can get a user to visit a webpage to trigger this vulnerability.,9.6,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H,N/A CVE-2023-48730,A cross-site scripting (xss) vulnerability exists in the navbarMenuAndLogo.php user name functionality of WWBN AVideo dev master commit 15fed957fb. A specially crafted HTTP request can lead to arbitrary Javascript execution. An attacker can get a user to visit a webpage to trigger this vulnerability.,8.5,CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H,N/A CVE-2023-49589,An insufficient entropy vulnerability exists in the userRecoverPass.php recoverPass generation functionality of WWBN AVideo dev master commit 15fed957fb. A specially crafted HTTP request can lead to an arbitrary user password recovery. An attacker can send an HTTP request to trigger this vulnerability.,8.8,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,N/A CVE-2023-49599,"An insufficient entropy vulnerability exists in the salt generation functionality of WWBN AVideo dev master commit 15fed957fb. A specially crafted series of HTTP requests can lead to privilege escalation. An attacker can gather system information via HTTP requests and brute force the salt offline, leading to forging a legitimate password recovery code for the admin user.",9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,N/A CVE-2023-49715,A unrestricted php file upload vulnerability exists in the import.json.php temporary copy functionality of WWBN AVideo dev master commit 15fed957fb. A specially crafted HTTP request can lead to arbitrary code execution when chained with an LFI vulnerability. An attacker can send a series of HTTP requests to trigger this vulnerability.,4.3,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N,N/A CVE-2023-49738,An information disclosure vulnerability exists in the image404Raw.php functionality of WWBN AVideo dev master commit 15fed957fb. A specially crafted HTTP request can lead to arbitrary file read.,7.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,N/A CVE-2023-49810,"A login attempt restriction bypass vulnerability exists in the checkLoginAttempts functionality of WWBN AVideo dev master commit 15fed957fb. A specially crafted HTTP request can lead to captcha bypass, which can be abused by an attacker to brute force user credentials. An attacker can send a series of HTTP requests to trigger this vulnerability.",7.3,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L,N/A CVE-2023-49862,An information disclosure vulnerability exists in the aVideoEncoderReceiveImage.json.php image upload functionality of WWBN AVideo dev master commit 15fed957fb. A specially crafted HTTP request can lead to arbitrary file read.This vulnerability is triggered by the `downloadURL_gifimage` parameter.,6.5,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N,N/A CVE-2023-49863,An information disclosure vulnerability exists in the aVideoEncoderReceiveImage.json.php image upload functionality of WWBN AVideo dev master commit 15fed957fb. A specially crafted HTTP request can lead to arbitrary file read.This vulnerability is triggered by the `downloadURL_webpimage` parameter.,6.5,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N,N/A CVE-2023-49864,An information disclosure vulnerability exists in the aVideoEncoderReceiveImage.json.php image upload functionality of WWBN AVideo dev master commit 15fed957fb. A specially crafted HTTP request can lead to arbitrary file read.This vulnerability is triggered by the `downloadURL_image` parameter.,6.5,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N,N/A CVE-2023-50172,A recovery notification bypass vulnerability exists in the userRecoverPass.php captcha validation functionality of WWBN AVideo dev master commit 15fed957fb. A specially crafted HTTP request can lead to the silent creation of a recovery pass code for any user.,5.3,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N,N/A CVE-2023-51962,Tenda AX1803 v1.0.0.1 contains a stack overflow via the iptv.stb.mode parameter in the function setIptvInfo.,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,Tenda Ax1803 Firmware 1.0.0.1 CVE-2023-51967,Tenda AX1803 v1.0.0.1 contains a stack overflow via the iptv.stb.port parameter in the function getIptvInfo.,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,Tenda Ax1803 Firmware 1.0.0.1 CVE-2023-51968,Tenda AX1803 v1.0.0.1 contains a stack overflow via the adv.iptv.stballvlans parameter in the function getIptvInfo.,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,Tenda Ax1803 Firmware 1.0.0.1 CVE-2023-51969,Tenda AX1803 v1.0.0.1 contains a stack overflow via the iptv.city.vlan parameter in the function getIptvInfo.,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,Tenda Ax1803 Firmware 1.0.0.1 CVE-2023-51970,Tenda AX1803 v1.0.0.1 contains a stack overflow via the iptv.stb.mode parameter in the function formSetIptv.,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,Tenda Ax1803 Firmware 1.0.0.1 CVE-2023-29444,"An uncontrolled search path element vulnerability (DLL hijacking) has been discovered that could allow a locally authenticated adversary to escalate privileges to SYSTEM. Alternatively, they could host a trojanized version of the software and trick victims into downloading and installing their malicious version to gain initial access and code execution.",6.3,CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H,N/A CVE-2023-37932,An improper limitation of a pathname to a restricted directory ('path traversal') vulnerability [CWE-22] in FortiVoiceEntreprise version 7.0.0 and before 6.4.7 allows an authenticated attacker to read arbitrary files from the system via sending crafted HTTP or HTTPS requests,6.5,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N,N/A CVE-2023-37934,An allocation of resources without limits or throttling vulnerability [CWE-770] in FortiPAM 1.0 all versions allows an authenticated attacker to perform a denial of service attack via sending crafted HTTP or HTTPS requests in a high frequency.,4.3,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L,Fortinet Fortipam CVE-2023-44250,An improper privilege management vulnerability [CWE-269] in a Fortinet FortiOS HA cluster version 7.4.0 through 7.4.1 and 7.2.5 and in a FortiProxy HA cluster version 7.4.0 through 7.4.1 allows an authenticated attacker to perform elevated actions via crafted HTTP or HTTPS requests.,8.8,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,"Fortinet Fortios 7.4.0, Fortinet Fortios 7.2.5, Fortinet Fortios 7.4.1" CVE-2023-46712,"A improper access control in Fortinet FortiPortal version 7.0.0 through 7.0.6, Fortinet FortiPortal version 7.2.0 through 7.2.1 allows attacker to escalate its privilege via specifically crafted HTTP requests.",7.2,CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H,N/A CVE-2023-48783,"An Authorization Bypass Through User-Controlled Key vulnerability [CWE-639] affecting PortiPortal version 7.2.1 and below, version 7.0.6 and below, version 6.0.14 and below, version 5.3.8 and below may allow a remote authenticated user with at least read-only permissions to access to other organization endpoints via crafted GET requests.",5.4,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N,N/A CVE-2023-50916,"Kyocera Device Manager before 3.1.1213.0 allows NTLM credential exposure during UNC path authentication via a crafted change from a local path to a UNC path. It allows administrators to configure the backup location of the database used by the application. Attempting to change this location to a UNC path via the GUI is rejected due to the use of a \ (backslash) character, which is supposed to be disallowed in a pathname. Intercepting and modifying this request via a proxy, or sending the request directly to the application endpoint, allows UNC paths to be set for the backup location. Once such a location is set, Kyocera Device Manager attempts to confirm access and will try to authenticate to the UNC path; depending on the configuration of the environment, this may authenticate to the UNC with Windows NTLM hashes. This could allow NTLM credential relaying or cracking attacks.",7.2,CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H,N/A CVE-2023-31488,"Hyland Perceptive Filters releases before 2023-12-08 (e.g., 11.4.0.2647), as used in Cisco IronPort Email Security Appliance Software, Cisco Secure Email Gateway, and various non-Cisco products, allow attackers to trigger a segmentation fault and execute arbitrary code via a crafted document.",9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,Cisco Secure Email Gateway Firmware CVE-2022-45793,Sysmac Studio installs executables in a directory with poor permissions. This can allow a locally-authenticated attacker to overwrite files which will result in code execution with privileges of a different user.,5.5,CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N,N/A CVE-2023-29445,An uncontrolled search path element vulnerability (DLL hijacking) has been discovered that could allow a locally authenticated adversary to escalate privileges to SYSTEM.,7.8,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,N/A CVE-2023-29446,An improper input validation vulnerability has been discovered that could allow an adversary to inject a UNC path via a malicious project file. This allows an adversary to capture NLTMv2 hashes and potentially crack them offline.,4.7,CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N,N/A CVE-2023-29447,An insufficiently protected credentials vulnerability in KEPServerEX could allow an adversary to capture user credentials as the web server uses basic authentication.,5.7,CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N,N/A CVE-2023-51126,Command injection vulnerability in /usr/www/res.php in FLIR AX8 up to 1.46.16 allows attackers to run arbitrary commands via the value parameter.,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,Flir Flir Ax8 Firmware CVE-2023-51127,"FLIR AX8 thermal sensor cameras up to and including 1.46.16 are vulnerable to Directory Traversal due to improper access restriction. This vulnerability allows an unauthenticated, remote attacker to obtain arbitrary sensitive file contents by uploading a specially crafted symbolic link file.",7.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,Flir Flir Ax8 Firmware 1.46.16 CVE-2023-52064,Wuzhicms v4.1.0 was discovered to contain a SQL injection vulnerability via the $keywords parameter at /core/admin/copyfrom.php.,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,N/A CVE-2022-32919,"The issue was addressed with improved UI handling. This issue is fixed in iOS 16.2 and iPadOS 16.2, macOS Ventura 13.1. Visiting a website that frames malicious content may lead to UI spoofing.",4.7,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N,"Apple Iphone Os, Apple Ipados, Apple Macos" CVE-2022-32931,This issue was addressed with improved data protection. This issue is fixed in macOS Ventura 13. An app with root privileges may be able to access private information.,5.5,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N,Apple Macos CVE-2022-42816,A logic issue was addressed with improved state management. This issue is fixed in macOS Ventura 13. An app may be able to modify protected parts of the file system.,5.5,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N,Apple Macos CVE-2022-42839,"This issue was addressed with improved redaction of sensitive information. This issue is fixed in iOS 16.2 and iPadOS 16.2, macOS Ventura 13.1. An app may be able to read sensitive location information.",3.3,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N,"Apple Iphone Os, Apple Ipados, Apple Macos" CVE-2022-46710,"A logic issue was addressed with improved checks. This issue is fixed in iOS 16.2 and iPadOS 16.2, macOS Ventura 13.1. Location data may be shared via iCloud links even if Location metadata is disabled via the Share Sheet.",5.5,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N,"Apple Iphone Os, Apple Ipados, Apple Macos" CVE-2022-46721,The issue was addressed with improved memory handling. This issue is fixed in macOS Ventura 13. An app may be able to execute arbitrary code with kernel privileges.,7.8,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,Apple Macos CVE-2022-47915,The issue was addressed with improved memory handling. This issue is fixed in macOS Ventura 13. An app may be able to execute arbitrary code with kernel privileges.,7.8,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,Apple Macos CVE-2022-47965,The issue was addressed with improved memory handling. This issue is fixed in macOS Ventura 13. An app may be able to execute arbitrary code with kernel privileges.,7.8,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,Apple Macos CVE-2022-48504,The issue was addressed with improved handling of caches. This issue is fixed in macOS Ventura 13. An app may be able to access user-sensitive data.,5.5,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N,Apple Macos CVE-2022-48577,An access issue was addressed with improved access restrictions. This issue is fixed in macOS Ventura 13. An app may be able to access user-sensitive data.,5.5,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N,Apple Macos CVE-2023-28185,"An integer overflow was addressed through improved input validation. This issue is fixed in tvOS 16.4, macOS Big Sur 11.7.5, iOS 16.4 and iPadOS 16.4, watchOS 9.4, macOS Monterey 12.6.4, iOS 15.7.4 and iPadOS 15.7.4. An app may be able to cause a denial-of-service.",5.5,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H,"Apple Tvos, Apple Iphone Os, Apple Ipados, Apple Macos, Apple Watchos" CVE-2023-28197,"An access issue was addressed with additional sandbox restrictions. This issue is fixed in macOS Ventura 13.3, macOS Big Sur 11.7.5, macOS Monterey 12.6.4. An app may be able to access user-sensitive data.",3.3,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N,Apple Macos CVE-2023-32366,"An out-of-bounds write issue was addressed with improved input validation. This issue is fixed in macOS Big Sur 11.7.5, macOS Ventura 13.3, iOS 16.4 and iPadOS 16.4, iOS 15.7.4 and iPadOS 15.7.4, macOS Monterey 12.6.4. Processing a font file may lead to arbitrary code execution.",7.8,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,"Apple Iphone Os, Apple Ipados, Apple Macos" CVE-2023-32378,"A use-after-free issue was addressed with improved memory management. This issue is fixed in macOS Ventura 13.3, macOS Big Sur 11.7.5, macOS Monterey 12.6.4. An app may be able to execute arbitrary code with kernel privileges.",7.8,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,Apple Macos CVE-2023-32383,"This issue was addressed by forcing hardened runtime on the affected binaries at the system level. This issue is fixed in macOS Monterey 12.6.6, macOS Big Sur 11.7.7, macOS Ventura 13.4. An app may be able to inject code into sensitive binaries bundled with Xcode.",7.8,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,Apple Macos CVE-2023-32401,"A buffer overflow was addressed with improved bounds checking. This issue is fixed in macOS Monterey 12.6.6, macOS Big Sur 11.7.7, macOS Ventura 13.4. Parsing an office document may lead to an unexpected app termination or arbitrary code execution.",7.8,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,Apple Macos CVE-2023-32424,"The issue was addressed with improved memory handling. This issue is fixed in iOS 16.4 and iPadOS 16.4, watchOS 9.4. An attacker that has already achieved kernel code execution may be able to bypass kernel memory mitigations.",5.5,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N,"Apple Iphone Os, Apple Ipados, Apple Watchos" CVE-2023-32436,The issue was addressed with improved bounds checks. This issue is fixed in macOS Ventura 13.3. An app may be able to cause unexpected system termination or write kernel memory.,7.1,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H,Apple Macos CVE-2023-38607,The issue was addressed with improved handling of caches. This issue is fixed in macOS Sonoma 14. An app may be able to modify Printer settings.,5.5,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N,Apple Macos CVE-2023-38610,"A memory corruption issue was addressed by removing the vulnerable code. This issue is fixed in macOS Sonoma 14, iOS 17 and iPadOS 17. An app may be able to cause unexpected system termination or write kernel memory.",7.1,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H,"Apple Iphone Os, Apple Ipados, Apple Macos" CVE-2023-38612,"The issue was addressed with improved checks. This issue is fixed in macOS Monterey 12.7, iOS 16.7 and iPadOS 16.7, iOS 17 and iPadOS 17, macOS Sonoma 14, macOS Ventura 13.6. An app may be able to access protected user data.",3.3,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N,"Apple Iphone Os, Apple Ipados, Apple Macos" CVE-2023-40383,A path handling issue was addressed with improved validation. This issue is fixed in macOS Ventura 13.3. An app may be able to access user-sensitive data.,3.3,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N,Apple Macos CVE-2023-40385,"This issue was addressed by removing the vulnerable code. This issue is fixed in macOS Sonoma 14, Safari 17, iOS 17 and iPadOS 17. A remote attacker may be able to view leaked DNS queries with Private Relay turned on.",6.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N,"Apple Iphone Os, Apple Ipados, Apple Macos" CVE-2023-40393,An authentication issue was addressed with improved state management. This issue is fixed in macOS Sonoma 14. Photos in the Hidden Photos Album may be viewed without authentication.,7.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,Apple Macos CVE-2023-40394,The issue was addressed with improved validation of environment variables. This issue is fixed in iOS 16.6 and iPadOS 16.6. An app may be able to access sensitive user data.,3.3,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N,"Apple Iphone Os, Apple Ipados" CVE-2023-40411,This issue was addressed with improved data protection. This issue is fixed in macOS Sonoma 14. An app may be able to access user-sensitive data.,5.5,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N,Apple Macos CVE-2023-40414,"A use-after-free issue was addressed with improved memory management. This issue is fixed in watchOS 10, iOS 17 and iPadOS 17, tvOS 17, macOS Sonoma 14, Safari 17. Processing web content may lead to arbitrary code execution.",9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,"Apple Tvos, Apple Iphone Os, Apple Ipados, Apple Macos, Apple Watchos" CVE-2023-40430,A logic issue was addressed with improved checks. This issue is fixed in macOS Sonoma 14. An app may be able to access removable volumes without user consent.,5.5,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N,Apple Macos CVE-2023-40433,A logic issue was addressed with improved checks. This issue is fixed in macOS Ventura 13.3. An app may bypass Gatekeeper checks.,5.5,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N,Apple Macos CVE-2023-40437,"A privacy issue was addressed with improved private data redaction for log entries. This issue is fixed in iOS 16.6 and iPadOS 16.6, macOS Ventura 13.5. An app may be able to read sensitive location information.",5.5,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N,"Apple Iphone Os, Apple Ipados, Apple Macos" CVE-2023-40438,"An issue was addressed with improved handling of temporary files. This issue is fixed in macOS Sonoma 14, iOS 16.7 and iPadOS 16.7. An app may be able to access edited photos saved to a temporary directory.",5.5,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N,"Apple Iphone Os, Apple Ipados, Apple Macos" CVE-2023-40439,"A privacy issue was addressed with improved private data redaction for log entries. This issue is fixed in iOS 16.6 and iPadOS 16.6, macOS Ventura 13.5. An app may be able to read sensitive location information.",3.3,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N,"Apple Iphone Os, Apple Ipados, Apple Macos" CVE-2023-40529,This issue was addressed with improved redaction of sensitive information. This issue is fixed in iOS 17 and iPadOS 17. A person with physical access to a device may be able to use VoiceOver to access private calendar information.,2.4,CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N,"Apple Iphone Os, Apple Ipados" CVE-2023-41060,"A type confusion issue was addressed with improved checks. This issue is fixed in macOS Sonoma 14, iOS 17 and iPadOS 17. A remote user may be able to cause kernel code execution.",8.8,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,"Apple Iphone Os, Apple Ipados, Apple Macos" CVE-2023-41069,This issue was addressed by improving Face ID anti-spoofing models. This issue is fixed in iOS 17 and iPadOS 17. A 3D model constructed to look like the enrolled user may authenticate via Face ID.,5.5,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N,"Apple Iphone Os, Apple Ipados" CVE-2023-41075,"A type confusion issue was addressed with improved checks. This issue is fixed in macOS Big Sur 11.7.5, macOS Ventura 13.3, iOS 16.4 and iPadOS 16.4, iOS 15.7.4 and iPadOS 15.7.4, macOS Monterey 12.6.4. An app may be able to execute arbitrary code with kernel privileges.",7.8,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,"Apple Iphone Os, Apple Ipados, Apple Macos" CVE-2023-41974,A use-after-free issue was addressed with improved memory management. This issue is fixed in iOS 17 and iPadOS 17. An app may be able to execute arbitrary code with kernel privileges.,7.8,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,"Apple Iphone Os, Apple Ipados" CVE-2023-41987,This issue was addressed with improved checks. This issue is fixed in macOS Sonoma 14. An app may be able to access sensitive user data.,5.5,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N,Apple Macos CVE-2023-41994,A logic issue was addressed with improved checks This issue is fixed in macOS Sonoma 14. A camera extension may be able to access the camera view from apps other than the app for which it was granted permission.,5.5,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N,Apple Macos CVE-2023-42826,The issue was addressed with improved checks. This issue is fixed in macOS Sonoma 14. Processing a file may lead to arbitrary code execution.,7.8,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,Apple Macos CVE-2023-42828,This issue was addressed by removing the vulnerable code. This issue is fixed in macOS Ventura 13.5. An app may be able to gain root privileges.,7.8,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,Apple Macos CVE-2023-42829,"The issue was addressed with additional restrictions on the observability of app states. This issue is fixed in macOS Big Sur 11.7.9, macOS Monterey 12.6.8, macOS Ventura 13.5. An app may be able to access SSH passphrases.",5.5,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N,Apple Macos CVE-2023-42830,"A privacy issue was addressed with improved private data redaction for log entries. This issue is fixed in macOS Ventura 13.3, iOS 16.4 and iPadOS 16.4. An app may be able to read sensitive location information.",3.3,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N,"Apple Iphone Os, Apple Ipados, Apple Macos" CVE-2023-42831,"This issue was addressed by removing the vulnerable code. This issue is fixed in macOS Big Sur 11.7.9, iOS 15.7.8 and iPadOS 15.7.8, macOS Monterey 12.6.8, macOS Ventura 13.5. An app may be able to fingerprint the user.",5.5,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N,"Apple Iphone Os, Apple Ipados, Apple Macos" CVE-2023-42832,"A race condition was addressed with improved state handling. This issue is fixed in macOS Big Sur 11.7.9, macOS Monterey 12.6.8, macOS Ventura 13.5. An app may be able to gain root privileges.",7.0,CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H,Apple Macos CVE-2023-42833,"A correctness issue was addressed with improved checks. This issue is fixed in macOS Sonoma 14, Safari 17, iOS 17 and iPadOS 17. Processing web content may lead to arbitrary code execution.",8.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,"Apple Iphone Os, Apple Ipados, Apple Macos" CVE-2023-42862,"An out-of-bounds read was addressed with improved input validation. This issue is fixed in macOS Ventura 13.3, tvOS 16.4, iOS 16.4 and iPadOS 16.4, watchOS 9.4. Processing an image may result in disclosure of process memory.",6.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N,"Apple Tvos, Apple Iphone Os, Apple Ipados, Apple Macos, Apple Watchos" CVE-2023-42865,"An out-of-bounds read was addressed with improved input validation. This issue is fixed in macOS Ventura 13.3, tvOS 16.4, iOS 16.4 and iPadOS 16.4, watchOS 9.4. Processing an image may result in disclosure of process memory.",6.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N,"Apple Tvos, Apple Iphone Os, Apple Ipados, Apple Macos, Apple Watchos" CVE-2023-42866,"The issue was addressed with improved memory handling. This issue is fixed in macOS Ventura 13.5, iOS 16.6 and iPadOS 16.6, tvOS 16.6, Safari 16.6, watchOS 9.6. Processing web content may lead to arbitrary code execution.",8.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,"Apple Tvos, Apple Iphone Os, Apple Ipados, Apple Macos, Apple Watchos" CVE-2023-42869,"Multiple memory corruption issues were addressed with improved input validation. This issue is fixed in macOS Ventura 13.4, iOS 16.5 and iPadOS 16.5. Multiple issues in libxml2.",7.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,"Apple Iphone Os, Apple Ipados, Apple Macos" CVE-2023-42870,"A use-after-free issue was addressed with improved memory management. This issue is fixed in macOS Sonoma 14, iOS 17 and iPadOS 17. An app may be able to execute arbitrary code with kernel privileges.",7.8,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,"Apple Iphone Os, Apple Ipados, Apple Macos" CVE-2023-42871,"The issue was addressed with improved memory handling. This issue is fixed in macOS Sonoma 14, iOS 17 and iPadOS 17. An app may be able to execute arbitrary code with kernel privileges.",7.8,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,"Apple Iphone Os, Apple Ipados, Apple Macos" CVE-2023-42872,"The issue was addressed with additional permissions checks. This issue is fixed in macOS Sonoma 14, iOS 17 and iPadOS 17. An app may be able to access sensitive user data.",5.5,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N,"Apple Iphone Os, Apple Ipados, Apple Macos" CVE-2023-42876,The issue was addressed with improved bounds checks. This issue is fixed in macOS Sonoma 14. Processing a file may lead to a denial-of-service or potentially disclose memory contents.,7.1,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H,Apple Macos CVE-2023-42929,The issue was addressed with improved checks. This issue is fixed in macOS Sonoma 14. An app may be able to access protected user data.,5.5,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N,Apple Macos CVE-2023-42933,This issue was addressed with improved checks. This issue is fixed in macOS Sonoma 14. An app may be able to gain elevated privileges.,7.8,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,Apple Macos CVE-2023-42934,"An information disclosure issue was addressed by removing the vulnerable code. This issue is fixed in macOS Sonoma 14, iOS 17 and iPadOS 17. An app with root privileges may be able to access private information.",4.2,CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:N/A:N,"Apple Iphone Os, Apple Ipados, Apple Macos" CVE-2023-42941,The issue was addressed with improved checks. This issue is fixed in iOS 17.2 and iPadOS 17.2. An attacker in a privileged network position may be able to perform a denial-of-service attack using crafted Bluetooth packets.,4.8,CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H,"Apple Iphone Os, Apple Ipados" CVE-2023-49295,"quic-go is an implementation of the QUIC protocol (RFC 9000, RFC 9001, RFC 9002) in Go. An attacker can cause its peer to run out of memory sending a large number of PATH_CHALLENGE frames. The receiver is supposed to respond to each PATH_CHALLENGE frame with a PATH_RESPONSE frame. The attacker can prevent the receiver from sending out (the vast majority of) these PATH_RESPONSE frames by collapsing the peers congestion window (by selectively acknowledging received packets) and by manipulating the peer's RTT estimate. This vulnerability has been patched in versions 0.37.7, 0.38.2 and 0.39.4.",6.4,CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H,N/A CVE-2023-51123,An issue discovered in D-Link dir815 v.1.01SSb08.bin allows a remote attacker to execute arbitrary code via a crafted POST request to the service parameter in the soapcgi_main function of the cgibin binary component.,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,Dlink Dir-815 Firmware 1.01ssb08.bin CVE-2024-0333,Insufficient data validation in Extensions in Google Chrome prior to 120.0.6099.216 allowed an attacker in a privileged network position to install a malicious extension via a crafted HTML page. (Chromium security severity: High),5.3,CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N,"Fedoraproject Fedora 39, Fedoraproject Fedora 38" CVE-2024-21638,"Azure IPAM (IP Address Management) is a lightweight solution developed on top of the Azure platform designed to help Azure customers manage their IP Address space easily and effectively. By design there is no write access to customers' Azure environments as the Service Principal used is only assigned the Reader role at the root Management Group level. Until recently, the solution lacked the validation of the passed in authentication token which may result in attacker impersonating any privileged user to access data stored within the IPAM instance and subsequently from Azure, causing an elevation of privilege. This vulnerability has been patched in version 3.0.0. ",9.1,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N,N/A CVE-2022-45794,"An attacker with network access to the affected PLC (CJ-series and CS-series PLCs, all versions) may use a network protocol to read and write files on the PLC internal memory and memory card. ",8.6,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N,"Omron Sysmac Cs1D-Cpu67H Firmware, Omron Sysmac Cs1D-Cpu67Ha Firmware, Omron Sysmac Cs1H-Cpu65H Firmware, Omron Sysmac Cs1D-Cpu67P Firmware, Omron Sysmac Cj1G-Cpu43P Firmware, Omron Sysmac Cj2M-Cpu12 Firmware, Omron Sysmac Cj2M-Cpu34 Firmware, Omron Sysmac Cj2H-Cpu65-Eip Firmware, Omron Sysmac Cj2M-Cpu35 Firmware, Omron Sysmac Cs1D-Cpu44Sa Firmware, Omron Sysmac Cs1G-Cpu44H Firmware, Omron Sysmac Cj2H-Cpu64 Firmware, Omron Sysmac Cj2M-Cpu15 Firmware, Omron Sysmac Cs1H-Cpu64H Firmware, Omron Sysmac Cj2M-Cpu14 Firmware, Omron Sysmac Cj2M-Cpu13 Firmware, Omron Sysmac Cs1D-Cpu68Ha Firmware, Omron Sysmac Cj2H-Cpu67-Eip Firmware, Omron Sysmac Cj2M-Cpu11 Firmware, Omron Sysmac Cj1G-Cpu45P Firmware, Omron Sysmac Cj2M-Cpu31 Firmware, Omron Sysmac Cj2M-Cpu33 Firmware, Omron Sysmac Cs1D-Cpu65P Firmware, Omron Sysmac Cs1H-Cpu67H Firmware, Omron Sysmac Cj2H-Cpu66 Firmware, Omron Sysmac Cs1H-Cpu66H Firmware, Omron Sysmac Cj2H-Cpu64-Eip Firmware, Omron Sysmac Cj1G-Cpu44P Firmware, Omron Sysmac Cj2M-Cpu32 Firmware, Omron Sysmac Cj2H-Cpu67 Firmware, Omron Sysmac Cj1G-Cpu42P Firmware, Omron Sysmac Cs1D-Cpu65H Firmware, Omron Sysmac Cj2H-Cpu68 Firmware, Omron Sysmac Cj2H-Cpu65 Firmware, Omron Sysmac Cs1D-Cpu67Sa Firmware, Omron Sysmac Cs1G-Cpu42H Firmware, Omron Sysmac Cj2H-Cpu68-Eip Firmware, Omron Sysmac Cs1G-Cpu43H Firmware, Omron Sysmac Cj2H-Cpu66-Eip Firmware, Omron Sysmac Cs1G-Cpu45H Firmware, Omron Sysmac Cs1H-Cpu63H Firmware" CVE-2024-21773,Multiple TP-LINK products allow a network-adjacent unauthenticated attacker with access to the product from the LAN port or Wi-Fi to execute arbitrary OS commands on the product that has pre-specified target devices and blocked URLs in parental control settings.,8.8,CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,"Tp-Link Deco X50 Firmware, Tp-Link Archer Ax3000 Firmware, Tp-Link Deco Xe200 Firmware, Tp-Link Archer Ax5400 Firmware" CVE-2024-21821,Multiple TP-LINK products allow a network-adjacent authenticated attacker with access to the product from the LAN port or Wi-Fi to execute arbitrary OS commands.,8.0,CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,"Tp-Link Archer Ax3000 Firmware, Tp-Link Archer Ax5400 Firmware, Tp-Link Archer Axe75 Firmware" CVE-2024-21833,"Multiple TP-LINK products allow a network-adjacent unauthenticated attacker with access to the product to execute arbitrary OS commands. The affected device, with the initial configuration, allows login only from the LAN port or Wi-Fi.",8.8,CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,"Tp-Link Archer Ax5400 Firmware, Tp-Link Archer Axe75 Firmware, Tp-Link Deco X50 Firmware, Tp-Link Archer Ax3000 Firmware, Tp-Link Deco Xe200 Firmware" CVE-2024-21665,ecommerce-framework-bundle is the Pimcore Ecommerce Framework Bundle. An authenticated and unauthorized user can access the back-office orders list and be able to query over the information returned. Access control and permissions are not being enforced. This vulnerability has been patched in version 1.0.10.,4.3,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N,N/A CVE-2024-21666,"The Customer Management Framework (CMF) for Pimcore adds functionality for customer data management, segmentation, personalization and marketing automation. An authenticated and unauthorized user can access the list of potential duplicate users and see their data. Permissions are enforced when reaching the `/admin/customermanagementframework/duplicates/list` endpoint allowing an authenticated user without the permissions to access the endpoint and query the data available there. Unauthorized user(s) can access PII data from customers. This vulnerability has been patched in version 4.0.6. ",6.5,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N,N/A CVE-2024-21667,"pimcore/customer-data-framework is the Customer Management Framework for management of customer data within Pimcore. An authenticated and unauthorized user can access the GDPR data extraction feature and query over the information returned, leading to customer data exposure. Permissions are not enforced when reaching the `/admin/customermanagementframework/gdpr-data/search-data-objects` endpoint allowing an authenticated user without the permissions to access the endpoint and query the data available there. An unauthorized user can access PII data from customers. This vulnerability has been patched in version 4.0.6. ",6.5,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N,N/A CVE-2023-45173,"IBM AIX 7.2, 7.3, and VIOS 3.1 could allow a non-privileged local user to exploit a vulnerability in the NFS kernel extension to cause a denial of service. IBM X-Force ID: 267971.",6.2,CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,"Ibm Aix 7.2, Ibm Aix 7.3" CVE-2023-45175,"IBM AIX 7.2, 7.3, and VIOS 3.1 could allow a non-privileged local user to exploit a vulnerability in the TCP/IP kernel extension to cause a denial of service. IBM X-Force ID: 267973.",6.2,CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,"Ibm Aix 7.2, Ibm Aix 7.3" CVE-2024-22190,"GitPython is a python library used to interact with Git repositories. There is an incomplete fix for CVE-2023-40590. On Windows, GitPython uses an untrusted search path if it uses a shell to run `git`, as well as when it runs `bash.exe` to interpret hooks. If either of those features are used on Windows, a malicious `git.exe` or `bash.exe` may be run from an untrusted repository. This issue has been patched in version 3.1.41.",7.8,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,N/A CVE-2022-40361,Cross Site Scripting Vulnerability in Elite CRM v1.2.11 allows attacker to execute arbitrary code via the language parameter to the /ngs/login endpoint.,6.1,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N,N/A CVE-2023-31001,IBM Security Access Manager Container (IBM Security Verify Access Appliance 10.0.0.0 through 10.0.6.1 and IBM Security Verify Access Docker 10.0.6.1) temporarily stores sensitive information in files that could be accessed by a local user. IBM X-Force ID: 254653.,5.1,CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N,N/A CVE-2023-31003,IBM Security Access Manager Container (IBM Security Verify Access Appliance 10.0.0.0 through 10.0.6.1 and IBM Security Verify Access Docker 10.0.6.1) could allow a local user to obtain root access due to improper access controls. IBM X-Force ID: 254658.,8.4,CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,N/A CVE-2023-38267,IBM Security Access Manager Appliance (IBM Security Verify Access Appliance 10.0.0.0 through 10.0.6.1 and IBM Security Verify Access Docker 10.0.6.1) could allow a local user to possibly elevate their privileges due to sensitive configuration information being exposed. IBM X-Force ID: 260584.,6.2,CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,N/A CVE-2023-45169,"IBM AIX 7.2, 7.3, and VIOS 3.1 could allow a non-privileged local user to exploit a vulnerability in the pmsvcs kernel extension to cause a denial of service. IBM X-Force ID: 267967.",6.2,CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,"Ibm Aix 7.2, Ibm Aix 7.3" CVE-2023-45171,"IBM AIX 7.2, 7.3, and VIOS 3.1 could allow a non-privileged local user to exploit a vulnerability in the kernel to cause a denial of service. IBM X-Force ID: 267969.",6.2,CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,"Ibm Aix 7.2, Ibm Aix 7.3" CVE-2023-51073,An issue in Buffalo LS210D v.1.78-0.03 allows a remote attacker to execute arbitrary code via the Firmware Update Script at /etc/init.d/update_notifications.sh.,8.1,CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H,Buffalo Ls210D Firmware 1.78-0.03 CVE-2023-52274,member/index/register.html in YzmCMS 6.5 through 7.0 allows XSS via the Referer HTTP header.,6.1,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N,N/A CVE-2024-22194,"cdo-local-uuid project provides a specialized UUID-generating function that can, on user request, cause a program to generate deterministic UUIDs. An information leakage vulnerability is present in `cdo-local-uuid` at version `0.4.0`, and in `case-utils` in unpatched versions (matching the pattern `0.x.0`) at and since `0.5.0`, before `0.15.0`. The vulnerability stems from a Python function, `cdo_local_uuid.local_uuid()`, and its original implementation `case_utils.local_uuid()`. ",2.2,CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:N,N/A CVE-2024-22195,"Jinja is an extensible templating engine. Special placeholders in the template allow writing code similar to Python syntax. It is possible to inject arbitrary HTML attributes into the rendered HTML template, potentially leading to Cross-Site Scripting (XSS). The Jinja `xmlattr` filter can be abused to inject arbitrary HTML attribute keys and values, bypassing the auto escaping mechanism and potentially leading to XSS. It may also be possible to bypass attribute validation checks if they are blacklist-based.",5.4,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N,N/A CVE-2023-5448,"The WP Register Profile With Shortcode plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 3.5.9. This is due to missing or incorrect nonce validation on the update_password_validate function. This makes it possible for unauthenticated attackers to reset a user's password via a forged request granted they can trick the user into performing an action such as clicking on a link.",8.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,N/A CVE-2023-6630,"The Contact Form 7 – Dynamic Text Extension plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 4.1.0 via the CF7_get_custom_field and CF7_get_current_user shortcodes due to missing validation on a user controlled key. This makes it possible for authenticated attackers with contributor access or higher to access arbitrary metadata of any post type, referencing the post by id and the meta by key.",4.3,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N,N/A CVE-2024-21637,Authentik is an open-source Identity Provider. Authentik is a vulnerable to a reflected Cross-Site Scripting vulnerability via JavaScript-URIs in OpenID Connect flows with `response_mode=form_post`. This relatively user could use the described attacks to perform a privilege escalation. This vulnerability has been patched in versions 2023.10.6 and 2023.8.6.,7.6,CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H,N/A CVE-2024-21669,"Hyperledger Aries Cloud Agent Python (ACA-Py) is a foundation for building decentralized identity applications and services running in non-mobile environments. When verifying W3C Format Verifiable Credentials using JSON-LD with Linked Data Proofs (LDP-VCs), the result of verifying the presentation `document.proof` was not factored into the final `verified` value (`true`/`false`) on the presentation record. The flaw enables holders of W3C Format Verifiable Credentials using JSON-LD with Linked Data Proofs (LDPs) to present incorrectly constructed proofs, and allows malicious verifiers to save and replay a presentation from such holders as their own. This vulnerability has been present since version 0.7.0 and fixed in version 0.10.5.",9.9,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:L,N/A CVE-2023-6223,"The LearnPress plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 4.2.5.7 via the /wp-json/lp/v1/profile/course-tab REST API due to missing validation on the 'userID' user controlled key. This makes it possible for authenticated attackers, with subscriber-level access and above, to retrieve the details of another user's course progress.",4.3,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N,N/A CVE-2023-6446,"The Calculated Fields Form plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 1.2.40 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.",4.4,CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N,N/A CVE-2023-6506,"The WP 2FA – Two-factor authentication for WordPress plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 2.5.0 via the send_backup_codes_email due to missing validation on a user controlled key. This makes it possible for subscriber-level attackers to email arbitrary users on the site.",4.3,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N,N/A CVE-2023-6520,"The WP 2FA – Two-factor authentication for WordPress plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.5.0. This is due to missing or incorrect nonce validation on the send_backup_codes_email function. This makes it possible for unauthenticated attackers to send emails with arbitrary content to registered users via a forged request granted they can trick a site administrator or other registered user into performing an action such as clicking on a link. While a nonce check is present, it is only executed if a nonce is set. By omitting a nonce from the request, the check can be bypassed.",4.3,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N,N/A CVE-2023-6699,"The WP Compress – Image Optimizer [All-In-One] plugin for WordPress is vulnerable to Directory Traversal in all versions up to, and including, 6.10.33 via the css parameter. This makes it possible for unauthenticated attackers to read the contents of arbitrary files on the server, which can contain sensitive information.",9.1,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N,N/A CVE-2023-6883,"The Easy Social Feed plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on multiple AJAX functions in all versions up to, and including, 6.5.2. This makes it possible for authenticated attackers, with subscriber-level access and above, to perform unauthorized actions, such as modifying the plugin's Facebook and Instagram access tokens and updating group IDs.",4.3,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N,N/A CVE-2023-37644,"SWFTools 0.9.2 772e55a allows attackers to trigger a large memory-allocation attempt via a crafted document, as demonstrated by pdf2swf. This occurs in png_read_chunk in lib/png.c.",5.5,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H,N/A CVE-2024-0252,ManageEngine ADSelfService Plus versions 6401 and below are vulnerable to the remote code execution due to the improper handling in the load balancer component. Authentication is required in order to exploit this vulnerability.,8.8,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,N/A CVE-2023-4246,"The GiveWP plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 2.33.3. This is due to missing or incorrect nonce validation on the give_sendwp_remote_install_handler function. This makes it possible for unauthenticated attackers to install and activate the SendWP plugin via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.",4.3,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N,N/A CVE-2023-4247,"The GiveWP plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 2.33.3. This is due to missing or incorrect nonce validation on the give_sendwp_disconnect function. This makes it possible for unauthenticated attackers to deactivate the SendWP plugin via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.",5.4,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L,N/A CVE-2023-4248,"The GiveWP plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 2.33.3. This is due to missing or incorrect nonce validation on the give_stripe_disconnect_connect_stripe_account function. This makes it possible for unauthenticated attackers to deactivate the plugin's stripe integration settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.",5.4,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L,N/A CVE-2023-4372,"The LiteSpeed Cache plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'esi' shortcode in versions up to, and including, 5.6 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.",6.4,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N,N/A CVE-2023-4960,"The WCFM Marketplace plugin for WordPress is vulnerable to Stored Cross-Site Scripting via 'wcfm_stores' shortcode in versions up to, and including, 3.6.2 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.",6.4,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N,N/A CVE-2023-4962,"The Video PopUp plugin for WordPress is vulnerable to Stored Cross-Site Scripting via 'video_popup' shortcode in versions up to, and including, 1.1.3 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.",6.4,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N,N/A CVE-2023-52027,TOTOlink A3700R v9.1.2u.5822_B20200513 was discovered to contain a remote command execution (RCE) vulnerability via the NTPSyncWithHost function.,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,Totolink A3700R Firmware 9.1.2u.5822_b20200513 CVE-2023-52028,TOTOlink A3700R v9.1.2u.5822_B20200513 was discovered to contain a remote command execution (RCE) vulnerability via the setTracerouteCfg function.,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,Totolink A3700R Firmware 9.1.2u.5822_b20200513 CVE-2023-52029,TOTOlink A3700R v9.1.2u.5822_B20200513 was discovered to contain a remote command execution (RCE) vulnerability via the setDiagnosisCfg function.,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,Totolink A3700R Firmware 9.1.2u.5822_b20200513 CVE-2023-52030,TOTOlink A3700R v9.1.2u.5822_B20200513 was discovered to contain a remote command execution (RCE) vulnerability via the setOpModeCfg function.,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,Totolink A3700R Firmware 9.1.2u.5822_b20200513 CVE-2023-52031,TOTOlink A3700R v9.1.2u.5822_B20200513 was discovered to contain a remote command execution (RCE) vulnerability via the UploadFirmwareFile function.,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,Totolink A3700R Firmware 9.1.2u.5822_b20200513 CVE-2023-52032,"TOTOlink EX1200T V4.1.2cu.5232_B20210713 was discovered to contain a remote command execution (RCE) vulnerability via the ""main"" function.",9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,Totolink Ex1200T Firmware 4.1.2cu.5232_b20210713 CVE-2023-5504,"The BackWPup plugin for WordPress is vulnerable to Directory Traversal in versions up to, and including, 4.0.1 via the Log File Folder. This allows authenticated attackers to store backups in arbitrary folders on the server provided they can be written to by the server. Additionally, default settings will place an index.php and a .htaccess file into the chosen directory (unless already present) when the first backup job is run that are intended to prevent directory listing and file access. This means that an attacker could set the backup directory to the root of another site in a shared environment and thus disable that site.",8.7,CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:H,N/A CVE-2023-5691,"The Chatbot for WordPress plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in version 2.3.9 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.",4.4,CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N,N/A CVE-2023-6220,"The Piotnet Forms plugin for WordPress is vulnerable to arbitrary file uploads due to insufficient file type validation in the 'piotnetforms_ajax_form_builder' function in versions up to, and including, 1.0.26. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.",8.1,CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H,N/A CVE-2023-6266,"The Backup Migration plugin for WordPress is vulnerable to unauthorized access of data due to insufficient path and file validation on the BMI_BACKUP case of the handle_downloading function in all versions up to, and including, 1.3.6. This makes it possible for unauthenticated attackers to download back-up files which can contain sensitive information such as user passwords, PII, database credentials, and much more.",7.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,N/A CVE-2023-6316,"The MW WP Form plugin for WordPress is vulnerable to arbitrary file uploads due to insufficient file type validation in the '_single_file_upload' function in versions up to, and including, 5.0.1. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.",9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,N/A CVE-2023-6369,"The Export WP Page to Static HTML/CSS plugin for WordPress is vulnerable to unauthorized access of data and modification of data due to a missing capability check on multiple AJAX actions in all versions up to, and including, 2.1.9. This makes it possible for authenticated attackers, with subscriber-level access and above, to disclose sensitive information or perform unauthorized actions, such as saving advanced plugin settings.",5.4,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N,N/A CVE-2023-6496,"The Manage Notification E-mails plugin for WordPress is vulnerable to Missing Authorization in all versions up to, and including, 1.8.5 via the card_famne_export_settings function. This makes it possible for unauthenticated attackers to obtain plugin settings.",5.3,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N,N/A CVE-2023-6504,"The User Profile Builder – Beautiful User Registration Forms, User Profiles & User Role Editor plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the wppb_toolbox_usermeta_handler function in all versions up to, and including, 3.10.7. This makes it possible for authenticated attackers, with contributor-level access and above, to expose sensitive information within user metadata.",4.3,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N,N/A CVE-2023-6556,"The FOX – Currency Switcher Professional for WooCommerce plugin for WordPress is vulnerable to Stored Cross-Site Scripting via currency options in all versions up to, and including, 1.4.1.5 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with subscriber-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.",5.4,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N,N/A CVE-2023-6558,"The Export and Import Users and Customers plugin for WordPress is vulnerable to arbitrary file uploads due to insufficient file type validation on the 'upload_import_file' function in versions up to, and including, 2.4.8. This makes it possible for authenticated attackers with shop manager-level capabilities or above, to upload arbitrary files on the affected site's server which may make remote code execution possible.",7.2,CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H,N/A CVE-2023-6561,"The Featured Image from URL (FIFU) plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the featured image alt text in all versions up to, and including, 4.5.3 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.",6.4,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N,N/A CVE-2023-6567,"The LearnPress plugin for WordPress is vulnerable to time-based SQL Injection via the ‘order_by’ parameter in all versions up to, and including, 4.2.5.7 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.",9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,N/A CVE-2023-6582,"The ElementsKit Elementor addons plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 3.0.3 via the ekit_widgetarea_content function. This makes it possible for unauthenticated attackers to obtain contents of posts in draft, private or pending review status that should not be visible to the general public. This applies to posts created with Elementor only.",5.3,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N,N/A CVE-2023-6583,"The Import and export users and customers plugin for WordPress is vulnerable to Directory Traversal in all versions up to, and including, 1.24.2 via the Recurring Import functionality. This makes it possible for authenticated attackers, with administrator access and above, to read and delete the contents of arbitrary files on the server including wp-config.php, which can contain sensitive information.",6.6,CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H,N/A CVE-2023-6598,"The SpeedyCache plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the speedycache_save_varniship, speedycache_img_update_settings, speedycache_preloading_add_settings, and speedycache_preloading_delete_resource functions in all versions up to, and including, 1.1.3. This makes it possible for authenticated attackers, with subscriber-level access and above, to update plugin options.",4.3,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N,N/A CVE-2023-6624,"The Import and export users and customers plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's shortcode(s) in all versions up to, and including, 1.24.3 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.",4.9,CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:N,N/A CVE-2023-6632,The Happy Addons for Elementor plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via DOM in all versions up to and including 3.9.1.1 (versions up to 2.9.1.1 in Happy Addons for Elementor Pro) due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.,6.1,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N,N/A CVE-2023-6634,"The LearnPress plugin for WordPress is vulnerable to Command Injection in all versions up to, and including, 4.2.5.7 via the get_content function. This is due to the plugin making use of the call_user_func function with user input. This makes it possible for unauthenticated attackers to execute any public function with one parameter, which could result in remote code execution.",8.1,CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H,N/A CVE-2023-6636,"The Greenshift – animation and page builder blocks plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation on the 'gspb_save_files' function in versions up to, and including, 7.6.2. This makes it possible for authenticated attackers with administrator-level capabilities or above, to upload arbitrary files on the affected site's server which may make remote code execution possible.",7.2,CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H,N/A CVE-2023-6637,"The CAOS | Host Google Analytics Locally plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'update_settings' function in versions up to, and including, 4.7.14. This makes it possible for unauthenticated attackers to update plugin settings.",6.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L,N/A CVE-2023-6638,"The GTG Product Feed for Shopping plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'update_settings' function in versions up to, and including, 1.2.4. This makes it possible for unauthenticated attackers to update plugin settings.",6.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L,N/A CVE-2023-6645,"The Post Grid Combo – 36+ Gutenberg Blocks plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the custom JS parameter in all versions up to, and including, 2.2.64 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor access or higher to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.",6.4,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N,N/A CVE-2023-6684,"The Ibtana – WordPress Website Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'ive' shortcode in versions up to, and including, 1.2.2 due to insufficient input sanitization and output escaping on 'width' and 'height' user supplied attribute. This makes it possible for authenticated attackers with contributor level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.",6.4,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N,N/A CVE-2023-6737,"The Enable Media Replace plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the SHORTPIXEL_DEBUG parameter in all versions up to, and including, 4.1.4 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. Exploiting this vulnerability requires the attacker to know the ID of an attachment uploaded by the user they are attacking.",4.7,CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N,N/A CVE-2023-6742,"The Gallery Plugin for WordPress – Envira Photo Gallery plugin for WordPress is vulnerable to unauthorized modification of data due to an improper capability check on the 'envira_gallery_insert_images' function in all versions up to, and including, 1.8.7.1. This makes it possible for authenticated attackers, with contributor access and above, to modify galleries on other users' posts.",4.3,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N,N/A CVE-2023-6751,"The Hostinger plugin for WordPress is vulnerable to unauthorized plugin settings update due to a missing capability check on the function publish_website in all versions up to, and including, 1.9.7. This makes it possible for unauthenticated attackers to enable and disable maintenance mode.",7.3,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L,N/A CVE-2023-6776,"The 3D FlipBook plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘Ready Function’ field in all versions up to, and including, 1.15.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.",6.4,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N,N/A CVE-2023-6781,"The Orbit Fox by ThemeIsle plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's custom fields in all versions up to, and including, 2.10.26 due to insufficient input sanitization and output escaping on user supplied values. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.",6.4,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N,N/A CVE-2023-6782,"The AMP for WP – Accelerated Mobile Pages plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's shortcode(s) in all versions up to, and including, 1.0.92 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.",6.4,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N,N/A CVE-2023-6828,"The Contact Form, Survey & Popup Form Plugin for WordPress – ARForms Form Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘ arf_http_referrer_url’ parameter in all versions up to, and including, 1.5.8 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.",7.2,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N,N/A CVE-2023-6855,"The Paid Memberships Pro – Content Restriction, User Registration, & Paid Subscriptions plugin for WordPress is vulnerable to unauthorized modification of membership levels created by the plugin due to an incorrectly implemented capability check in the pmpro_rest_api_get_permissions_check function in all versions up to 2.12.5 (inclusive). This makes it possible for unauthenticated attackers to change membership levels including prices.",5.3,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N,N/A CVE-2023-6875,"The POST SMTP Mailer – Email log, Delivery Failure Notifications and Best Mail SMTP for WordPress plugin for WordPress is vulnerable to unauthorized access of data and modification of data due to a type juggling issue on the connect-app REST endpoint in all versions up to, and including, 2.8.7. This makes it possible for unauthenticated attackers to reset the API key used to authenticate to the mailer and view logs, including password reset emails, allowing site takeover.",9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,N/A CVE-2023-6878,"The Slick Social Share Buttons plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'dcssb_ajax_update' function in versions up to, and including, 2.4.11. This makes it possible for authenticated attackers, with subscriber-level permissions or above to update the site options arbitrarily.",8.8,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,N/A CVE-2023-6882,"The Simple Membership plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the ‘environment_mode’ parameter in all versions up to, and including, 4.3.8 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.",6.1,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N,N/A CVE-2023-6924,"The Photo Gallery by 10Web plugin for WordPress is vulnerable to Stored Cross-Site Scripting via widgets in versions up to, and including, 1.8.18 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with administrator-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. It can also be exploited with a contributor-level permission with a page builder plugin.",4.4,CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N,N/A CVE-2023-6934,"The Limit Login Attempts Reloaded plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's shortcode(s) in all versions up to, and including, 2.25.26 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.",6.4,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N,N/A CVE-2023-6979,"The Customer Reviews for WooCommerce plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the ivole_import_upload_csv AJAX action in all versions up to, and including, 5.38.9. This makes it possible for authenticated attackers, with author-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible.",9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,N/A CVE-2023-6988,"The Colibri Page Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's extend_builder_render_js shortcode in all versions up to, and including, 1.0.239 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.",6.4,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N,N/A CVE-2023-6990,"The Weaver Xtreme theme for WordPress is vulnerable to Stored Cross-Site Scripting via custom post meta in all versions up to, and including, 6.3.0 due to insufficient input sanitization and output escaping on user supplied meta (page-head-code). This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.",5.4,CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N,N/A CVE-2023-6994,"The List category posts plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'catlist' shortcode in all versions up to, and including, 0.89.3 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.",6.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N,N/A CVE-2023-7019,"The LightStart – Maintenance Mode, Coming Soon and Landing Page Builder plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the insert_template function in all versions up to, and including, 2.6.8. This makes it possible for authenticated attackers, with subscriber-level access and above, to change page designs.",4.3,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N,N/A CVE-2023-7048,"The My Sticky Bar plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.6.6. This is due to missing or incorrect nonce validation in mystickymenu-contact-leads.php. This makes it possible for unauthenticated attackers to trigger the export of a CSV file containing contact leads via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. Because the CSV file is exported to a public location, it can be downloaded during a very short window of time before it is automatically deleted by the export function.",3.1,CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N,N/A CVE-2023-7070,"The Email Encoder – Protect Email Addresses and Phone Numbers plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's eeb_mailto shortcode in all versions up to, and including, 2.1.9 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.",6.4,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N,N/A CVE-2023-7071,"The Essential Blocks – Page Builder Gutenberg Blocks, Patterns & Templates plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Table of Contents block in all versions up to, and including, 4.4.6 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.",6.4,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N,N/A CVE-2022-4958,A vulnerability classified as problematic has been found in qkmc-rk redbbs 1.0. Affected is an unknown function of the component Post Handler. The manipulation of the argument title leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-250236.,3.5,CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N,N/A CVE-2023-20573,"A privileged attacker can prevent delivery of debug exceptions to SEV-SNP guests potentially resulting in guests not receiving expected debug information. ",3.2,CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:L/A:N,"Amd Epyc 9454P Firmware, Amd Epyc 8224P Firmware, Amd Epyc 9754 Firmware, Amd Epyc 9224 Firmware, Amd Epyc 9174F Firmware, Amd Epyc 8024Pn Firmware, Amd Epyc 7303P Firmware, Amd Epyc 7573X Firmware, Amd Epyc 9354 Firmware, Amd Epyc 7643P Firmware, Amd Epyc 7303 Firmware, Amd Epyc 7313 Firmware, Amd Epyc 8434Pn Firmware, Amd Epyc 8324Pn Firmware, Amd Epyc 9374F Firmware, Amd Epyc 7203P Firmware, Amd Epyc 7413 Firmware, Amd Epyc 9124 Firmware, Amd Epyc 7663P Firmware, Amd Epyc 8124P Firmware, Amd Epyc 7543P Firmware, Amd Epyc 7343 Firmware, Amd Epyc 8534P Firmware, Amd Epyc 9554 Firmware, Amd Epyc 8224Pn Firmware, Amd Epyc 9554P Firmware, Amd Epyc 9754S Firmware, Amd Epyc 72F3 Firmware, Amd Epyc 9454 Firmware, Amd Epyc 7643 Firmware, Amd Epyc 7773X Firmware, Amd Epyc 74F3 Firmware, Amd Epyc 9654 Firmware, Amd Epyc 8024P Firmware, Amd Epyc 7373X Firmware, Amd Epyc 7513 Firmware, Amd Epyc 7763 Firmware, Amd Epyc 7663 Firmware, Amd Epyc 7543 Firmware, Amd Epyc 7713P Firmware, Amd Epyc 7453 Firmware, Amd Epyc 9254 Firmware, Amd Epyc 9384X Firmware, Amd Epyc 8124Pn Firmware, Amd Epyc 9474F Firmware, Amd Epyc 7443P Firmware, Amd Epyc 75F3 Firmware, Amd Epyc 9184X Firmware, Amd Epyc 8324P Firmware, Amd Epyc 8434P Firmware, Amd Epyc 9654P Firmware, Amd Epyc 7313P Firmware, Amd Epyc 9534 Firmware, Amd Epyc 9634 Firmware, Amd Epyc 73F3 Firmware, Amd Epyc 9684X Firmware, Amd Epyc 9334 Firmware, Amd Epyc 9734 Firmware, Amd Epyc 7713 Firmware, Amd Epyc 7473X Firmware, Amd Epyc 9354P Firmware, Amd Epyc 8534Pn Firmware, Amd Epyc 7443 Firmware, Amd Epyc 7203 Firmware, Amd Epyc 9274F Firmware" CVE-2023-50159,"In ScaleFusion (Windows Desktop App) agent 10.5.2, Kiosk mode application restrictions can be bypassed allowing arbitrary code to be executed. This is fixed in 10.5.7 by preventing the launching of the file explorer in Agent-based Multi-App and Single App Kiosk mode.",8.8,CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H,N/A CVE-2023-51748,ScaleFusion 10.5.2 does not properly limit users to the Edge application because Ctrl-O and Ctrl-S can be used. This is fixed in 10.5.7 by preventing the launching of the file explorer in Agent-based Multi-App and Single App Kiosk mode.,8.8,CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H,N/A CVE-2023-51749,"ScaleFusion 10.5.2 does not properly limit users to the Edge application because a search can be made from a tooltip. NOTE: the vendor's position is ""Not vulnerable if the default Windows device profile configuration is used which utilizes modern management with website allow-listing rules.""",8.8,CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H,N/A CVE-2023-51750,"ScaleFusion 10.5.2 does not properly limit users to the Edge application because file downloads can occur. NOTE: the vendor's position is ""Not vulnerable if the default Windows device profile configuration is used which utilizes modern management with website allow-listing rules.""",4.6,CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,Microsoft Windows CVE-2023-51751,ScaleFusion 10.5.2 does not properly limit users to the Edge application because Alt-F4 can be used. This is fixed in 10.5.7 by preventing the launching of the file explorer in Agent-based Multi-App and Single App Kiosk mode.,6.8,CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,Microsoft Windows CVE-2023-6242,"The EventON - WordPress Virtual Event Calendar Plugin plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 4.5.4 (for Pro) & 2.2.7 (for Free). This is due to missing or incorrect nonce validation on the evo_eventpost_update_meta function. This makes it possible for unauthenticated attackers to update arbitrary post metadata via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.",6.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N,N/A CVE-2023-6244,"The EventON - WordPress Virtual Event Calendar Plugin plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 4.5.4 (Pro) & 2.2.8 (Free). This is due to missing or incorrect nonce validation on the save_virtual_event_settings function. This makes it possible for unauthenticated attackers to modify virtual event settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.",6.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N,N/A CVE-2023-6938,"The Oxygen Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via a custom field in all versions up to, and including, 4.8 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. NOTE: Version 4.8.1 of the Oxygen Builder plugin for WordPress addresses this vulnerability by implementing an optional filter to provide output escaping for dynamic data. Please see https://oxygenbuilder.com/documentation/other/security/#filtering-dynamic-data for more details.",6.4,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N,N/A CVE-2023-51984,D-Link DIR-822+ V1.0.2 was found to contain a command injection in SetStaticRouteSettings function. allows remote attackers to execute arbitrary commands via shell.,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,Dlink Dir-822 Firmware 1.0.2 CVE-2023-51987,"D-Link DIR-822+ V1.0.2 contains a login bypass in the HNAP1 interface, which allows attackers to log in to administrator accounts with empty passwords.",9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,Dlink Dir-822 Firmware 1.0.2 CVE-2023-51989,"D-Link DIR-822+ V1.0.2 contains a login bypass in the HNAP1 interface, which allows attackers to log in to administrator accounts with empty passwords.",9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,Dlink Dir-822 Firmware 1.0.2 CVE-2023-5118,"The application is vulnerable to Stored Cross-Site Scripting (XSS) in the endpoint /sofer/DocumentService.asc/SaveAnnotation, where input data transmitted via the POST method in the parameters author and text are not adequately sanitized and validated. This allows for the injection of malicious JavaScript code. The vulnerability was identified in the function for adding new annotations while editing document content. Reporters inform that the vulnerability has been removed in software versions above 11.1.x. Previous versions may also be vulnerable, but this has not been confirmed. ",5.4,CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N,N/A CVE-2023-6554,"When access to the ""admin"" folder is not protected by some external authorization mechanisms e.g. Apache Basic Auth, it is possible for any user to download protected information like exam answers. ",6.5,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N,N/A CVE-2024-0429,"A denial service vulnerability has been found on  Hex Workshop affecting version 6.7, an attacker could send a command line file arguments and control the Structured Exception Handler (SEH) records resulting in a service shutdown.",7.3,CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H,N/A CVE-2024-22942,TOTOLINK A3300R V17.0.0cu.557_B20221024 was discovered to contain a command injection vulnerability via the hostName parameter in the setWanCfg function.,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,Totolink A3300R Firmware 17.0.0cu.557_b20221024 CVE-2024-23057,TOTOLINK A3300R V17.0.0cu.557_B20221024 was discovered to contain a command injection vulnerability via the tz parameter in the setNtpCfg function.,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,Totolink A3300R Firmware 17.0.0cu.557_b20221024 CVE-2024-23058,TOTOLINK A3300R V17.0.0cu.557_B20221024 was discovered to contain a command injection vulnerability via the pass parameter in the setTr069Cfg function.,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,Totolink A3300R Firmware 17.0.0cu.557_b20221024 CVE-2024-23059,TOTOLINK A3300R V17.0.0cu.557_B20221024 was discovered to contain a command injection vulnerability via the username parameter in the setDdnsCfg function.,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,Totolink A3300R Firmware 17.0.0cu.557_b20221024 CVE-2024-23060,TOTOLINK A3300R V17.0.0cu.557_B20221024 was discovered to contain a command injection vulnerability via the ip parameter in the setDmzCfg function.,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,Totolink A3300R Firmware 17.0.0cu.557_b20221024 CVE-2024-23061,TOTOLINK A3300R V17.0.0cu.557_B20221024 was discovered to contain a command injection vulnerability via the minute parameter in the setScheduleCfg function.,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,Totolink A3300R Firmware 17.0.0cu.557_b20221024 CVE-2023-50671,"In exiftags 1.01, nikon_prop1 in nikon.c has a heap-based buffer overflow (write of size 28) because snprintf can write to an unexpected address.",7.8,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,N/A CVE-2024-0411,A vulnerability was found in DeShang DSMall up to 6.1.0. It has been classified as problematic. This affects an unknown part of the file public/install.php of the component HTTP GET Request Handler. The manipulation leads to improper access controls. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-250431.,5.3,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N,N/A CVE-2024-0412,A vulnerability was found in DeShang DSShop up to 3.1.0. It has been declared as problematic. This vulnerability affects unknown code of the file public/install.php of the component HTTP GET Request Handler. The manipulation leads to improper access controls. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-250432.,5.3,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N,N/A CVE-2024-0413,A vulnerability was found in DeShang DSKMS up to 3.1.2. It has been rated as problematic. This issue affects some unknown processing of the file public/install.php. The manipulation leads to improper access controls. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-250433 was assigned to this vulnerability.,5.3,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N,N/A CVE-2024-0414,A vulnerability classified as problematic has been found in DeShang DSCMS up to 3.1.2/7.1. Affected is an unknown function of the file public/install.php. The manipulation leads to improper access controls. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-250434 is the identifier assigned to this vulnerability.,5.3,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N,N/A CVE-2024-0415,A vulnerability classified as critical was found in DeShang DSMall up to 6.1.0. Affected by this vulnerability is an unknown functionality of the file application/home/controller/TaobaoExport.php of the component Image URL Handler. The manipulation leads to improper access controls. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-250435.,6.3,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L,N/A CVE-2024-0416,"A vulnerability, which was classified as critical, has been found in DeShang DSMall up to 5.0.3. Affected by this issue is some unknown functionality of the file application/home/controller/MemberAuth.php. The manipulation of the argument file_name leads to path traversal: '../filedir'. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-250436.",5.4,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L,N/A CVE-2024-0417,"A vulnerability, which was classified as critical, was found in DeShang DSShop up to 2.1.5. This affects an unknown part of the file application/home/controller/MemberAuth.php. The manipulation of the argument member_info leads to path traversal: '../filedir'. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-250437 was assigned to this vulnerability.",5.4,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L,N/A CVE-2024-0418,A vulnerability has been found in iSharer and upRedSun File Sharing Wizard up to 1.5.0 and classified as problematic. This vulnerability affects unknown code of the component GET Request Handler. The manipulation leads to denial of service. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-250438 is the identifier assigned to this vulnerability.,5.3,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L,N/A CVE-2024-22197,"Nginx-ui is online statistics for Server Indicators​​ Monitor CPU usage, memory usage, load average, and disk usage in real-time. The `Home > Preference` page exposes a small list of nginx settings such as `Nginx Access Log Path` and `Nginx Error Log Path`. However, the API also exposes `test_config_cmd`, `reload_cmd` and `restart_cmd`. While the UI doesn't allow users to modify any of these settings, it is possible to do so by sending a request to the API. This issue may lead to authenticated Remote Code Execution, Privilege Escalation, and Information Disclosure. This issue has been patched in version 2.0.0.beta.9.",7.7,CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L,N/A CVE-2024-22199,"This package provides universal methods to use multiple template engines with the Fiber web framework using the Views interface. This vulnerability specifically impacts web applications that render user-supplied data through this template engine, potentially leading to the execution of malicious scripts in users' browsers when visiting affected web pages. The vulnerability has been addressed, the template engine now defaults to having autoescape set to `true`, effectively mitigating the risk of XSS attacks. ",9.3,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:H/A:N,N/A CVE-2023-51780,An issue was discovered in the Linux kernel before 6.6.8. do_vcc_ioctl in net/atm/ioctl.c has a use-after-free because of a vcc_recvmsg race condition.,7.0,CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H,"Linux Linux Kernel 2.6.12, Debian Debian Linux 10.0, Linux Linux Kernel, Linux Linux Kernel 6.7" CVE-2023-51781,An issue was discovered in the Linux kernel before 6.6.8. atalk_ioctl in net/appletalk/ddp.c has a use-after-free because of an atalk_recvmsg race condition.,7.0,CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H,"Linux Linux Kernel 2.6.12, Debian Debian Linux 10.0, Linux Linux Kernel, Linux Linux Kernel 6.7" CVE-2023-51782,An issue was discovered in the Linux kernel before 6.6.8. rose_ioctl in net/rose/af_rose.c has a use-after-free because of a rose_accept race condition.,7.0,CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H,"Linux Linux Kernel 2.6.12, Debian Debian Linux 10.0, Linux Linux Kernel, Linux Linux Kernel 6.7" CVE-2024-0419,A vulnerability was found in Jasper httpdx up to 1.5.4 and classified as problematic. This issue affects some unknown processing of the component HTTP POST Request Handler. The manipulation leads to denial of service. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-250439.,5.3,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L,N/A CVE-2024-0422,A vulnerability was found in CodeAstro POS and Inventory Management System 1.0. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /new_item of the component New Item Creation Page. The manipulation of the argument new_item leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-250441 was assigned to this vulnerability.,3.5,CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N,N/A CVE-2024-0423,A vulnerability was found in CodeAstro Online Food Ordering System 1.0. It has been rated as problematic. Affected by this issue is some unknown functionality of the file dishes.php. The manipulation of the argument res_id leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-250442 is the identifier assigned to this vulnerability.,3.5,CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N,N/A CVE-2024-0424,A vulnerability classified as problematic has been found in CodeAstro Simple Banking System 1.0. This affects an unknown part of the file createuser.php of the component Create a User Page. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-250443.,3.5,CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N,N/A CVE-2024-0425,A vulnerability classified as critical was found in ForU CMS up to 2020-06-23. This vulnerability affects unknown code of the file /admin/index.php?act=reset_admin_psw. The manipulation leads to weak password recovery. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-250444.,5.3,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N,N/A CVE-2024-22196,"Nginx-UI is an online statistics for Server Indicators​​ Monitor CPU usage, memory usage, load average, and disk usage in real-time. This issue may lead to information disclosure. By using `DefaultQuery`, the `""desc""` and `""id""` values are used as default values if the query parameters are not set. Thus, the `order` and `sort_by` query parameter are user-controlled and are being appended to the `order` variable without any sanitization. This issue has been patched in version 2.0.0.beta.9. ",7.0,CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:L,N/A CVE-2024-22198,"Nginx-UI is a web interface to manage Nginx configurations. It is vulnerable to arbitrary command execution by abusing the configuration settings. The `Home > Preference` page exposes a list of system settings such as `Run Mode`, `Jwt Secret`, `Node Secret` and `Terminal Start Command`. While the UI doesn't allow users to modify the `Terminal Start Command` setting, it is possible to do so by sending a request to the API. This issue may lead to authenticated remote code execution, privilege escalation, and information disclosure. This vulnerability has been patched in version 2.0.0.beta.9.",7.1,CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L,N/A CVE-2022-4959,A vulnerability classified as problematic was found in qkmc-rk redbbs 1.0. Affected by this vulnerability is an unknown functionality of the component Nickname Handler. The manipulation leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-250237 was assigned to this vulnerability.,3.5,CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N,N/A CVE-2023-50123,"The number of attempts to bring the Hozard Alarm system (alarmsystemen) v1.0 to a disarmed state is not limited. This could allow an attacker to perform a brute force on the SMS authentication, to bring the alarm system to a disarmed state.",8.1,CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H,N/A CVE-2023-50124,"Flient Smart Door Lock v1.0 is vulnerable to Use of Default Credentials. Due to default credentials on a debug interface, in combination with certain design choices, an attacker can unlock the Flient Smart Door Lock by replacing the fingerprint that is stored on the scanner.",6.8,CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,Flient Smart Lock Advanced Firmware 1.0 CVE-2023-50125,A default engineer password set on the Hozard alarm system (Alarmsysteem) v1.0 allows an attacker to bring the alarm system to a disarmed state.,5.9,CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N,N/A CVE-2023-50126,"Missing encryption in the RFID tags of the Hozard alarm system (Alarmsysteem) v1.0 allow attackers to create a cloned tag via brief physical proximity to one of the original tags, which results in an attacker being able to bring the alarm system to a disarmed state.",6.5,CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N,N/A CVE-2023-50127,"Hozard alarm system (Alarmsysteem) v1.0 is vulnerable to Improper Authentication. Commands sent via the SMS functionality are accepted from random phone numbers, which allows an attacker to bring the alarm system to a disarmed state from any given phone number.",5.9,CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N,N/A CVE-2023-50128,"The remote keyless system of the Hozard alarm system (alarmsystemen) v1.0 sends an identical radio frequency signal for each request, which results in an attacker being able to conduct replay attacks to bring the alarm system to a disarmed state.",5.3,CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N,N/A CVE-2023-50129,"Missing encryption in the NFC tags of the Flient Smart Door Lock v1.0 allows attackers to create a cloned tag via brief physical proximity to the original tags, which results in an attacker gaining access to the perimeter.",6.5,CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N,Flient Smart Lock Advanced Firmware 1.0 CVE-2023-7226,A vulnerability was found in meetyoucrop big-whale 1.1 and classified as critical. Affected by this issue is some unknown functionality of the file /auth/user/all.api of the component Admin Module. The manipulation of the argument id leads to improper ownership management. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-250232.,6.3,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L,N/A CVE-2024-0426,"A vulnerability, which was classified as critical, has been found in ForU CMS up to 2020-06-23. This issue affects some unknown processing of the file admin/cms_template.php. The manipulation of the argument t_name/t_path leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-250445 was assigned to this vulnerability.",6.3,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L,N/A CVE-2024-20675,Microsoft Edge (Chromium-based) Security Feature Bypass Vulnerability,6.3,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L,N/A CVE-2023-46474,File Upload vulnerability PMB v.7.4.8 allows a remote attacker to execute arbitrary code and escalate privileges via a crafted PHP file uploaded to the start_import.php file.,7.2,CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H,N/A CVE-2024-21337,Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability,5.2,CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:L,N/A CVE-2023-51350,A spoofing attack in ujcms v.8.0.2 allows a remote attacker to obtain sensitive information and execute arbitrary code via a crafted script to the X-Forwarded-For function in the header.,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,N/A CVE-2024-0443,"A flaw was found in the blkgs destruction path in block/blk-cgroup.c in the Linux kernel, leading to a cgroup blkio memory leakage problem. When a cgroup is being destroyed, cgroup_rstat_flush() is only called at css_release_work_fn(), which is called when the blkcg reference count reaches 0. This circular dependency will prevent blkcg and some blkgs from being freed after they are made offline. This issue may allow an attacker with a local access to cause system instability, such as an out of memory error.",5.5,CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H,"Fedoraproject Fedora 39, Redhat Enterprise Linux 9.0, Linux Linux Kernel 6.4, Redhat Enterprise Linux 8.0, Linux Linux Kernel" CVE-2024-21982,"ONTAP versions 9.4 and higher are susceptible to a vulnerability which when successfully exploited could lead to disclosure of sensitive information to unprivileged attackers when the object-store profiler command is being run by an administrative user. ",4.8,CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N,"Netapp Clustered Data Ontap 9.10.1, Netapp Clustered Data Ontap, Netapp Clustered Data Ontap 9.11.1, Netapp Clustered Data Ontap 9.9.1, Netapp Clustered Data Ontap 9.8, Netapp Clustered Data Ontap 9.13.1, Netapp Clustered Data Ontap 9.12.1" CVE-2023-36842," An Improper Check for Unusual or Exceptional Conditions vulnerability in Juniper DHCP Daemon (jdhcpd) of Juniper Networks Junos OS allows an adjacent, unauthenticated attacker to cause the jdhcpd to consume all the CPU cycles resulting in a Denial of Service (DoS). On Junos OS devices with forward-snooped-client configured, if an attacker sends a specific DHCP packet to a non-configured interface, this will cause an infinite loop. The DHCP process will have to be restarted to recover the service. This issue affects: Juniper Networks Junos OS * All versions earlier than 20.4R3-S9; * 21.2 versions earlier than 21.2R3-S7; * 21.3 versions earlier than 21.3R3-S5; * 21.4 versions earlier than 21.4R3-S5; * 22.1 versions earlier than 22.1R3-S4; * 22.2 versions earlier than 22.2R3-S3; * 22.3 versions earlier than 22.3R3-S2; * 22.4 versions earlier than 22.4R2-S2, 22.4R3; * 23.2 versions earlier than 23.2R2. ",6.5,CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,"Juniper Junos 20.4, Juniper Junos, Juniper Junos 22.1, Juniper Junos 22.4, Juniper Junos 21.3, Juniper Junos 21.4, Juniper Junos 23.2, Juniper Junos 22.2, Juniper Junos 22.3, Juniper Junos 21.2" CVE-2024-21585," An Improper Handling of Exceptional Conditions vulnerability in BGP session processing of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated network-based attacker, using specific timing outside the attacker's control, to flap BGP sessions and cause the routing protocol daemon (rpd) process to crash and restart, leading to a Denial of Service (DoS) condition. Continued BGP session flapping will create a sustained Denial of Service (DoS) condition. This issue only affects routers configured with non-stop routing (NSR) enabled. Graceful Restart (GR) helper mode, enabled by default, is also required for this issue to be exploitable. Note: NSR is not supported on the SRX Series and is therefore not affected by this vulnerability. When the BGP session flaps on the NSR-enabled router, the device enters GR-helper/LLGR-helper mode due to the peer having negotiated GR/LLGR-restarter capability and the backup BGP requests for replication of the GR/LLGR-helper session, master BGP schedules, and initiates replication of GR/LLGR stale routes to the backup BGP. In this state, if the BGP session with the BGP peer comes up again, unsolicited replication is initiated for the peer without cleaning up the ongoing GR/LLGR-helper mode replication. This parallel two instances of replication for the same peer leads to the assert if the BGP session flaps again. This issue affects: Juniper Networks Junos OS * All versions earlier than 20.4R3-S9; * 21.2 versions earlier than 21.2R3-S7; * 21.3 versions earlier than 21.3R3-S5; * 21.4 versions earlier than 21.4R3-S5; * 22.1 versions earlier than 22.1R3-S4; * 22.2 versions earlier than 22.2R3-S3; * 22.3 versions earlier than 22.3R3-S1; * 22.4 versions earlier than 22.4R2-S2, 22.4R3; * 23.2 versions earlier than 23.2R1-S1, 23.2R2. Juniper Networks Junos OS Evolved * All versions earlier than 21.3R3-S5-EVO; * 21.4 versions earlier than 21.4R3-S5-EVO; * 22.1 versions earlier than 22.1R3-S4-EVO; * 22.2 versions earlier than 22.2R3-S3-EVO; * 22.3 versions earlier than 22.3R3-S1-EVO; * 22.4 versions earlier than 22.4R2-S2-EVO, 22.4R3-EVO; * 23.2 versions earlier than 23.2R1-S1-EVO, 23.2R2-EVO. ",5.9,CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H,"Juniper Junos 20.4, Juniper Junos Os Evolved 22.1, Juniper Junos 22.1, Juniper Junos 22.4, Juniper Junos Os Evolved 22.4, Juniper Junos 21.3, Juniper Junos 21.4, Juniper Junos 23.2, Juniper Junos 22.2, Juniper Junos Os Evolved 21.4, Juniper Junos Os Evolved 22.2, Juniper Junos Os Evolved 21.3, Juniper Junos 22.3, Juniper Junos Os Evolved 23.2, Juniper Junos Os Evolved 22.3, Juniper Junos 21.2" CVE-2024-21587," An Improper Handling of Exceptional Conditions vulnerability in the broadband edge subscriber management daemon (bbe-smgd) of Juniper Networks Junos OS on MX Series allows an attacker directly connected to the vulnerable system who repeatedly flaps DHCP subscriber sessions to cause a slow memory leak, ultimately leading to a Denial of Service (DoS). Memory can only be recovered by manually restarting bbe-smgd. This issue only occurs if BFD liveness detection for DHCP subscribers is enabled. Systems without BFD liveness detection enabled are not vulnerable to this issue. Indication of the issue can be observed by periodically executing the 'show system processes extensive' command, which will indicate an increase in memory allocation for bbe-smgd. A small amount of memory is leaked every time a DHCP subscriber logs in, which will become visible over time, ultimately leading to memory starvation. user@junos> show system processes extensive | match bbe-smgd 13071 root 24 0 415M 201M select 0 0:41 7.28% bbe-smgd{bbe-smgd} 13071 root 20 0 415M 201M select 1 0:04 0.00% bbe-smgd{bbe-smgd} ... user@junos> show system processes extensive | match bbe-smgd 13071 root 20 0 420M 208M select 0 4:33 0.10% bbe-smgd{bbe-smgd} 13071 root 20 0 420M 208M select 0 0:12 0.00% bbe-smgd{bbe-smgd} ... This issue affects Juniper Networks Junos OS on MX Series: * All versions earlier than 20.4R3-S9; * 21.2 versions earlier than 21.2R3-S7; * 21.3 versions earlier than 21.3R3-S5; * 21.4 versions earlier than 21.4R3-S5; * 22.1 versions earlier than 22.1R3-S4; * 22.2 versions earlier than 22.2R3-S3; * 22.3 versions earlier than 22.3R3-S2; * 22.4 versions earlier than 22.4R2-S2, 22.4R3; * 23.2 versions earlier than 23.2R1-S1, 23.2R2. ",6.5,CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,"Juniper Junos 20.4, Juniper Junos 22.1, Juniper Junos 22.4, Juniper Junos 21.3, Juniper Junos 21.4, Juniper Junos 23.2, Juniper Junos 22.2, Juniper Junos 22.3, Juniper Junos 21.2" CVE-2024-21589," An Improper Access Control vulnerability in the Juniper Networks Paragon Active Assurance Control Center allows an unauthenticated network-based attacker to access reports without authenticating, potentially containing sensitive configuration information. A feature was introduced in version 3.1.0 of the Paragon Active Assurance Control Center which allows users to selectively share account data. By exploiting this vulnerability, it is possible to access reports without being logged in, resulting in the opportunity for malicious exfiltration of user data. Note that the Paragon Active Assurance Control Center SaaS offering is not affected by this issue. This issue affects Juniper Networks Paragon Active Assurance versions 3.1.0, 3.2.0, 3.2.2, 3.3.0, 3.3.1, 3.4.0. This issue does not affect Juniper Networks Paragon Active Assurance versions earlier than 3.1.0. ",7.4,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N,N/A CVE-2024-21591," An Out-of-bounds Write vulnerability in J-Web of Juniper Networks Junos OS on SRX Series and EX Series allows an unauthenticated, network-based attacker to cause a Denial of Service (DoS), or Remote Code Execution (RCE) and obtain root privileges on the device. This issue is caused by use of an insecure function allowing an attacker to overwrite arbitrary memory. This issue affects Juniper Networks Junos OS SRX Series and EX Series: * Junos OS versions earlier than 20.4R3-S9; * Junos OS 21.2 versions earlier than 21.2R3-S7; * Junos OS 21.3 versions earlier than 21.3R3-S5; * Junos OS 21.4 versions earlier than 21.4R3-S5; * Junos OS 22.1 versions earlier than 22.1R3-S4; * Junos OS 22.2 versions earlier than 22.2R3-S3; * Junos OS 22.3 versions earlier than 22.3R3-S2; * Junos OS 22.4 versions earlier than 22.4R2-S2, 22.4R3. ",9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,"Juniper Junos 20.4, Juniper Junos, Juniper Junos 22.1, Juniper Junos 22.4, Juniper Junos 21.3, Juniper Junos 21.4, Juniper Junos 22.2, Juniper Junos 22.3, Juniper Junos 21.2" CVE-2024-21594," A Heap-based Buffer Overflow vulnerability in the Network Services Daemon (NSD) of Juniper Networks Junos OS allows authenticated, low privileged, local attacker to cause a Denial of Service (DoS). On an SRX 5000 Series device, when executing a specific command repeatedly, memory is corrupted, which leads to a Flow Processing Daemon (flowd) crash. The NSD process has to be restarted to restore services. If this issue occurs, it can be checked with the following command: user@host> request security policies check The following log message can also be observed: Error: policies are out of sync for PFE node.fpc.pic. This issue affects: Juniper Networks Junos OS on SRX 5000 Series * All versions earlier than 20.4R3-S6; * 21.1 versions earlier than 21.1R3-S5; * 21.2 versions earlier than 21.2R3-S4; * 21.3 versions earlier than 21.3R3-S3; * 21.4 versions earlier than 21.4R3-S3; * 22.1 versions earlier than 22.1R3-S1; * 22.2 versions earlier than 22.2R3; * 22.3 versions earlier than 22.3R2. ",5.5,CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H,"Juniper Junos 20.4, Juniper Junos, Juniper Junos 22.1, Juniper Junos 21.3, Juniper Junos 21.4, Juniper Junos 22.2, Juniper Junos 22.3, Juniper Junos 21.1, Juniper Junos 21.2" CVE-2024-21595," An Improper Validation of Syntactic Correctness of Input vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS allows a network-based, unauthenticated attacker to cause a Denial of Service (DoS). If an attacker sends high rate of specific ICMP traffic to a device with VXLAN configured, this causes a deadlock of the PFE and results in the device becoming unresponsive. A manual restart will be required to recover the device. This issue only affects EX4100, EX4400, EX4600, QFX5000 Series devices. This issue affects: Juniper Networks Junos OS * 21.4R3 versions earlier than 21.4R3-S4; * 22.1R3 versions earlier than 22.1R3-S3; * 22.2R2 versions earlier than 22.2R3-S1; * 22.3 versions earlier than 22.3R2-S2, 22.3R3; * 22.4 versions earlier than 22.4R2; * 23.1 versions earlier than 23.1R2. ",7.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,"Juniper Junos 22.1, Juniper Junos 22.4, Juniper Junos 21.4, Juniper Junos 23.1, Juniper Junos 22.2, Juniper Junos 22.3" CVE-2024-21596," A Heap-based Buffer Overflow vulnerability in the Routing Protocol Daemon (RPD) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, network based attacker to cause a Denial of Service (DoS). If an attacker sends a specific BGP UPDATE message to the device, this will cause a memory overwrite and therefore an RPD crash and restart in the backup Routing Engine (RE). Continued receipt of these packets will cause a sustained Denial of Service (DoS) condition in the backup RE. The primary RE is not impacted by this issue and there is no impact on traffic. This issue only affects devices with NSR enabled. Note: NSR is not supported on the SRX Series and is therefore not affected by this vulnerability. This issue requires an attacker to have an established BGP session to a system affected by the issue. This issue affects both eBGP and iBGP implementations. This issue affects: Juniper Networks Junos OS * All versions earlier than 20.4R3-S9; * 21.2 versions earlier than 21.2R3-S7; * 21.3 versions earlier than 21.3R3-S5; * 21.4 versions earlier than 21.4R3-S5; * 22.1 versions earlier than 22.1R3-S4; * 22.2 versions earlier than 22.2R3-S2; * 22.3 versions earlier than 22.3R3-S1; * 22.4 versions earlier than 22.4R2-S2, 22.4R3; * 23.1 versions earlier than 23.1R2; * 23.2 versions earlier than 23.2R1-S2, 23.2R2. Juniper Networks Junos OS Evolved * All versions earlier than 21.3R3-S5-EVO; * 21.4-EVO versions earlier than 21.4R3-S5-EVO; * 22.1-EVO versions earlier than 22.1R3-S4-EVO; * 22.2-EVO versions earlier than 22.2R3-S2-EVO; * 22.3-EVO versions later than 22.3R1-EVO; * 22.4-EVO versions earlier than 22.4R2-S2-EVO, 22.4R3-EVO; * 23.1-EVO versions earlier than 23.1R2-EVO; * 23.2-EVO versions earlier than 23.2R1-S2-EVO, 23.2R2-EVO. ",5.3,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L,"Juniper Junos 20.4, Juniper Junos Os Evolved 22.1, Juniper Junos 22.1, Juniper Junos 22.4, Juniper Junos Os Evolved 22.4, Juniper Junos 21.3, Juniper Junos 21.4, Juniper Junos Os Evolved 23.1, Juniper Junos 23.1, Juniper Junos 23.2, Juniper Junos 22.2, Juniper Junos Os Evolved 21.4, Juniper Junos Os Evolved 22.2, Juniper Junos Os Evolved 21.3, Juniper Junos 22.3, Juniper Junos Os Evolved 23.2, Juniper Junos Os Evolved 22.3, Juniper Junos 21.2" CVE-2024-21597," An Exposure of Resource to Wrong Sphere vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS on MX Series allows an unauthenticated, network-based attacker to bypass the intended access restrictions. In an Abstracted Fabric (AF) scenario if routing-instances (RI) are configured, specific valid traffic destined to the device can bypass the configured lo0 firewall filters as it's received in the wrong RI context. This issue affects Juniper Networks Junos OS on MX Series: * All versions earlier than 20.4R3-S9; * 21.2 versions earlier than 21.2R3-S3; * 21.4 versions earlier than 21.4R3-S5; * 22.1 versions earlier than 22.1R3; * 22.2 versions earlier than 22.2R3; * 22.3 versions earlier than 22.3R2. ",5.3,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N,"Juniper Junos 20.4, Juniper Junos 22.1, Juniper Junos 21.4, Juniper Junos 22.2, Juniper Junos 22.3, Juniper Junos 21.2" CVE-2024-21599," A Missing Release of Memory after Effective Lifetime vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS on MX Series allows an adjacent, unauthenticated attacker to cause a Denial of Service (DoS). If an MX Series device receives PTP packets on an MPC3E that doesn't support PTP this causes a memory leak which will result in unpredictable behavior and ultimately in an MPC crash and restart. To monitor for this issue, please use the following FPC vty level commands: show heap shows an increase in ""LAN buffer"" utilization and show clksync ptp nbr-upd-info shows non-zero ""Pending PFEs"" counter. This issue affects Juniper Networks Junos OS on MX Series with MPC3E: * All versions earlier than 20.4R3-S3; * 21.1 versions earlier than 21.1R3-S4; * 21.2 versions earlier than 21.2R3; * 21.3 versions earlier than 21.3R2-S1, 21.3R3; * 21.4 versions earlier than 21.4R2; * 22.1 versions earlier than 22.1R2. ",6.5,CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,"Juniper Junos 20.4, Juniper Junos 22.1, Juniper Junos 21.3, Juniper Junos 21.4, Juniper Junos 21.1, Juniper Junos 21.2" CVE-2024-21600," An Improper Neutralization of Equivalent Special Elements vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS on PTX Series allows a unauthenticated, adjacent attacker to cause a Denial of Service (DoS). When MPLS packets are meant to be sent to a flexible tunnel interface (FTI) and if the FTI tunnel is down, these will hit the reject NH, due to which the packets get sent to the CPU and cause a host path wedge condition. This will cause the FPC to hang and requires a manual restart to recover. Please note that this issue specifically affects PTX1000, PTX3000, PTX5000 with FPC3, PTX10002-60C, and PTX10008/16 with LC110x. Other PTX Series devices and Line Cards (LC) are not affected. The following log message can be seen when the issue occurs: Cmerror Op Set: Host Loopback: HOST LOOPBACK WEDGE DETECTED IN PATH ID (URI: /fpc//pfe//cm//Host_Loopback//HOST_LOOPBACK_MAKE_CMERROR_ID[]) This issue affects Juniper Networks Junos OS: * All versions earlier than 20.4R3-S8; * 21.1 versions earlier than 21.1R3-S4; * 21.2 versions earlier than 21.2R3-S6; * 21.3 versions earlier than 21.3R3-S3; * 21.4 versions earlier than 21.4R3-S5; * 22.1 versions earlier than 22.1R2-S2, 22.1R3; * 22.2 versions earlier than 22.2R2-S1, 22.2R3. ",6.5,CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,"Juniper Junos 20.4, Juniper Junos 22.1, Juniper Junos 21.3, Juniper Junos 21.4, Juniper Junos 22.2, Juniper Junos 21.1, Juniper Junos 21.2" CVE-2024-21601," A Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') vulnerability in the Flow-processing Daemon (flowd) of Juniper Networks Junos OS on SRX Series allows an unauthenticated, network-based attacker to cause a Denial-of-Service (Dos). On SRX Series devices when two different threads try to simultaneously process a queue which is used for TCP events flowd will crash. One of these threads can not be triggered externally, so the exploitation of this race condition is outside the attackers direct control. Continued exploitation of this issue will lead to a sustained DoS. This issue affects Juniper Networks Junos OS: * 21.2 versions earlier than 21.2R3-S5; * 21.3 versions earlier than 21.3R3-S5; * 21.4 versions earlier than 21.4R3-S4; * 22.1 versions earlier than 22.1R3-S3; * 22.2 versions earlier than 22.2R3-S1; * 22.3 versions earlier than 22.3R2-S2, 22.3R3; * 22.4 versions earlier than 22.4R2-S1, 22.4R3. This issue does not affect Juniper Networks Junos OS versions earlier than 21.2R1. ",5.9,CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H,"Juniper Junos 22.1, Juniper Junos 22.4, Juniper Junos 21.3, Juniper Junos 21.4, Juniper Junos 22.2, Juniper Junos 22.3, Juniper Junos 21.2" CVE-2024-21602," A NULL Pointer Dereference vulnerability in Juniper Networks Junos OS Evolved on ACX7024, ACX7100-32C and ACX7100-48L allows an unauthenticated, network-based attacker to cause a Denial of Service (DoS). If a specific IPv4 UDP packet is received and sent to the Routing Engine (RE) packetio crashes and restarts which causes a momentary traffic interruption. Continued receipt of such packets will lead to a sustained DoS. This issue does not happen with IPv6 packets. This issue affects Juniper Networks Junos OS Evolved on ACX7024, ACX7100-32C and ACX7100-48L: * 21.4-EVO versions earlier than 21.4R3-S6-EVO; * 22.1-EVO versions earlier than 22.1R3-S5-EVO; * 22.2-EVO versions earlier than 22.2R2-S1-EVO, 22.2R3-EVO; * 22.3-EVO versions earlier than 22.3R2-EVO. This issue does not affect Juniper Networks Junos OS Evolved versions earlier than 21.4R1-EVO. ",7.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,"Juniper Junos Os Evolved 22.3, Juniper Junos Os Evolved 21.4, Juniper Junos Os Evolved 22.2, Juniper Junos Os Evolved 22.1" CVE-2024-21603," An Improper Check for Unusual or Exceptional Conditions vulnerability in the kernel of Juniper Network Junos OS on MX Series allows a network based attacker with low privileges to cause a denial of service. If a scaled configuration for Source class usage (SCU) / destination class usage (DCU) (more than 10 route classes) is present and the SCU/DCU statistics are gathered by executing specific SNMP requests or CLI commands, a 'vmcore' for the RE kernel will be seen which leads to a device restart. Continued exploitation of this issue will lead to a sustained DoS. This issue only affects MX Series devices with MPC10, MPC11 or LC9600, and MX304. No other MX Series devices are affected. This issue affects Juniper Networks Junos OS: * All versions earlier than 20.4R3-S9; * 21.2 versions earlier than 21.2R3-S6; * 21.3 versions earlier than 21.3R3-S5; * 21.4 versions earlier than 21.4R3; * 22.1 versions earlier than 22.1R3; * 22.2 versions earlier than 22.2R2; * 22.3 versions earlier than 22.3R2. ",6.5,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H,"Juniper Junos 20.4, Juniper Junos 22.1, Juniper Junos 21.3, Juniper Junos 21.4, Juniper Junos 22.2, Juniper Junos 22.3, Juniper Junos 21.2" CVE-2024-21604," An Allocation of Resources Without Limits or Throttling vulnerability in the kernel of Juniper Networks Junos OS Evolved allows an unauthenticated, network-based attacker to cause a Denial of Service (DoS). If a high rate of specific valid packets are processed by the routing engine (RE) this will lead to a loss of connectivity of the RE with other components of the chassis and thereby a complete and persistent system outage. Please note that a carefully designed lo0 firewall filter will block or limit these packets which should prevent this issue from occurring. The following log messages can be seen when this issue occurs: kernel: nf_conntrack: nf_conntrack: table full, dropping packet This issue affects Juniper Networks Junos OS Evolved: * All versions earlier than 20.4R3-S7-EVO; * 21.2R1-EVO and later versions; * 21.4-EVO versions earlier than 21.4R3-S5-EVO; * 22.1-EVO versions earlier than 22.1R3-S2-EVO; * 22.2-EVO versions earlier than 22.2R3-EVO; * 22.3-EVO versions earlier than 22.3R2-EVO; * 22.4-EVO versions earlier than 22.4R2-EVO. ",7.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,"Juniper Junos Os Evolved 22.1, Juniper Junos Os Evolved 21.4, Juniper Junos Os Evolved 22.2, Juniper Junos Os Evolved 22.4, Juniper Junos Os Evolved 21.2, Juniper Junos Os Evolved 22.3" CVE-2024-21606," A Double Free vulnerability in the flow processing daemon (flowd) of Juniper Networks Junos OS on SRX Series allows a network-based, unauthenticated attacker to cause a Denial of Service (DoS). In a remote access VPN scenario, if a ""tcp-encap-profile"" is configured and a sequence of specific packets is received, a flowd crash and restart will be observed. This issue affects Juniper Networks Junos OS on SRX Series: * All versions earlier than 20.4R3-S8; * 21.2 versions earlier than 21.2R3-S6; * 21.3 versions earlier than 21.3R3-S5; * 21.4 versions earlier than 21.4R3-S5; * 22.1 versions earlier than 22.1R3-S3; * 22.2 versions earlier than 22.2R3-S3; * 22.3 versions earlier than 22.3R3-S1; * 22.4 versions earlier than 22.4R2-S2, 22.4R3. ",7.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,"Juniper Junos 20.4, Juniper Junos, Juniper Junos 22.1, Juniper Junos 22.4, Juniper Junos 21.3, Juniper Junos 21.4, Juniper Junos 22.2, Juniper Junos 22.3, Juniper Junos 21.2" CVE-2024-21607," An Unsupported Feature in the UI vulnerability in Juniper Networks Junos OS on MX Series and EX9200 Series allows an unauthenticated, network-based attacker to cause partial impact to the integrity of the device. If the ""tcp-reset"" option is added to the ""reject"" action in an IPv6 filter which matches on ""payload-protocol"", packets are permitted instead of rejected. This happens because the payload-protocol match criteria is not supported in the kernel filter causing it to accept all packets without taking any other action. As a fix the payload-protocol match will be treated the same as a ""next-header"" match to avoid this filter bypass. This issue doesn't affect IPv4 firewall filters. This issue affects Juniper Networks Junos OS on MX Series and EX9200 Series: * All versions earlier than 20.4R3-S7; * 21.1 versions earlier than 21.1R3-S5; * 21.2 versions earlier than 21.2R3-S5; * 21.3 versions earlier than 21.3R3-S4; * 21.4 versions earlier than 21.4R3-S4; * 22.1 versions earlier than 22.1R3-S2; * 22.2 versions earlier than 22.2R3-S2; * 22.3 versions earlier than 22.3R2-S2, 22.3R3; * 22.4 versions earlier than 22.4R1-S2, 22.4R2-S2, 22.4R3. ",5.3,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N,"Juniper Junos 20.4, Juniper Junos, Juniper Junos 22.1, Juniper Junos 22.4, Juniper Junos 21.3, Juniper Junos 21.4, Juniper Junos 22.2, Juniper Junos 22.3, Juniper Junos 21.1, Juniper Junos 21.2" CVE-2024-21611," A Missing Release of Memory after Effective Lifetime vulnerability in the Routing Protocol Daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, network-based attacker to cause a Denial of Service (DoS). In a Juniper Flow Monitoring (jflow) scenario route churn that causes BGP next hops to be updated will cause a slow memory leak and eventually a crash and restart of rpd. Thread level memory utilization for the areas where the leak occurs can be checked using the below command: user@host> show task memory detail | match so_in so_in6 28 32 344450 11022400 344760 11032320 so_in 8 16 1841629 29466064 1841734 29467744 This issue affects: Junos OS * 21.4 versions earlier than 21.4R3; * 22.1 versions earlier than 22.1R3; * 22.2 versions earlier than 22.2R3. Junos OS Evolved * 21.4-EVO versions earlier than 21.4R3-EVO; * 22.1-EVO versions earlier than 22.1R3-EVO; * 22.2-EVO versions earlier than 22.2R3-EVO. This issue does not affect: Juniper Networks Junos OS versions earlier than 21.4R1. Juniper Networks Junos OS Evolved versions earlier than 21.4R1. ",7.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,"Juniper Junos Os Evolved 22.1, Juniper Junos 22.1, Juniper Junos 21.4, Juniper Junos Os Evolved 21.4, Juniper Junos 22.2, Juniper Junos Os Evolved 22.2" CVE-2024-21612," An Improper Handling of Syntactically Invalid Structure vulnerability in Object Flooding Protocol (OFP) service of Juniper Networks Junos OS Evolved allows an unauthenticated, network-based attacker to cause a Denial of Service (DoS). On all Junos OS Evolved platforms, when specific TCP packets are received on an open OFP port, the OFP crashes leading to a restart of Routine Engine (RE). Continuous receipt of these specific TCP packets will lead to a sustained Denial of Service (DoS) condition. This issue affects: Juniper Networks Junos OS Evolved * All versions earlier than 21.2R3-S7-EVO; * 21.3 versions earlier than 21.3R3-S5-EVO ; * 21.4 versions earlier than 21.4R3-S5-EVO; * 22.1 versions earlier than 22.1R3-S4-EVO; * 22.2 versions earlier than 22.2R3-S3-EVO ; * 22.3 versions earlier than 22.3R3-EVO; * 22.4 versions earlier than 22.4R2-EVO, 22.4R3-EVO. ",7.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,"Juniper Junos Os Evolved 22.1, Juniper Junos Os Evolved, Juniper Junos Os Evolved 21.4, Juniper Junos Os Evolved 22.2, Juniper Junos Os Evolved 21.3, Juniper Junos Os Evolved 22.4, Juniper Junos Os Evolved 21.2, Juniper Junos Os Evolved 22.3" CVE-2024-21613," A Missing Release of Memory after Effective Lifetime vulnerability in Routing Protocol Daemon (RPD) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, adjacent attacker to cause an rpd crash, leading to Denial of Service (DoS). On all Junos OS and Junos OS Evolved platforms, when traffic engineering is enabled for OSPF or ISIS, and a link flaps, a patroot memory leak is observed. This memory leak, over time, will lead to an rpd crash and restart. The memory usage can be monitored using the below command. user@host> show task memory detail | match patroot This issue affects: Juniper Networks Junos OS * All versions earlier than 21.2R3-S3; * 21.3 versions earlier than 21.3R3-S5; * 21.4 versions earlier than 21.4R3-S3; * 22.1 versions earlier than 22.1R3; * 22.2 versions earlier than 22.2R3. Juniper Networks Junos OS Evolved * All versions earlier than 21.3R3-S5-EVO; * 21.4 versions earlier than 21.4R3-EVO; * 22.1 versions earlier than 22.1R3-EVO; * 22.2 versions earlier than 22.2R3-EVO. ",6.5,CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,"Juniper Junos Os Evolved 22.1, Juniper Junos 22.1, Juniper Junos 21.3, Juniper Junos 21.4, Juniper Junos 22.2, Juniper Junos Os Evolved 21.4, Juniper Junos Os Evolved 22.2, Juniper Junos Os Evolved 21.3, Juniper Junos 21.2" CVE-2024-21614," An Improper Check for Unusual or Exceptional Conditions vulnerability in Routing Protocol Daemon (RPD) of Juniper Networks Junos OS and Junos OS Evolved allows a network-based, unauthenticated attacker to cause rpd to crash, leading to Denial of Service (DoS). On all Junos OS and Junos OS Evolved platforms, when NETCONF and gRPC are enabled, and a specific query is executed via Dynamic Rendering (DREND), rpd will crash and restart. Continuous execution of this specific query will cause a sustained Denial of Service (DoS) condition. This issue affects: Juniper Networks Junos OS * 22.2 versions earlier than 22.2R2-S2, 22.2R3; * 22.3 versions earlier than 22.3R2, 22.3R3. Juniper Networks Junos OS Evolved * 22.2 versions earlier than 22.2R2-S2-EVO, 22.2R3-EVO; * 22.3 versions earlier than 22.3R2-EVO, 22.3R3-EVO. This issue does not affect Juniper Networks: Junos OS versions earlier than 22.2R1; Junos OS Evolved versions earlier than 22.2R1-EVO. ",7.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,"Juniper Junos 22.3, Juniper Junos 22.2, Juniper Junos Os Evolved 22.2, Juniper Junos Os Evolved 22.3" CVE-2024-21616," An Improper Validation of Syntactic Correctness of Input vulnerability in Packet Forwarding Engine (PFE) of Juniper Networks Junos OS allows an unauthenticated, network-based attacker to cause Denial of Service (DoS). On all Junos OS MX Series and SRX Series platforms, when SIP ALG is enabled, and a specific SIP packet is received and processed, NAT IP allocation fails for genuine traffic, which causes Denial of Service (DoS). Continuous receipt of this specific SIP ALG packet will cause a sustained DoS condition. NAT IP usage can be monitored by running the following command. user@srx> show security nat resource-usage source-pool Pool name: source_pool_name .. Address Factor-index Port-range Used Avail Total Usage X.X.X.X 0 Single Ports 50258 52342 62464 96% <<<<< - Alg Ports 0 2048 2048 0% This issue affects: Juniper Networks Junos OS on MX Series and SRX Series * All versions earlier than 21.2R3-S6; * 21.3 versions earlier than 21.3R3-S5; * 21.4 versions earlier than 21.4R3-S5; * 22.1 versions earlier than 22.1R3-S4; * 22.2 versions earlier than 22.2R3-S3; * 22.3 versions earlier than 22.3R3-S1; * 22.4 versions earlier than 22.4R2-S2, 22.4R3; * 23.2 versions earlier than 23.2R1-S1, 23.2R2. ",7.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,"Juniper Junos 22.1, Juniper Junos 22.4, Juniper Junos 21.3, Juniper Junos 21.4, Juniper Junos 23.2, Juniper Junos 22.2, Juniper Junos 22.3, Juniper Junos 21.2" CVE-2024-21617," An Incomplete Cleanup vulnerability in Nonstop active routing (NSR) component of Juniper Networks Junos OS allows an adjacent, unauthenticated attacker to cause memory leak leading to Denial of Service (DoS). On all Junos OS platforms, when NSR is enabled, a BGP flap will cause memory leak. A manual reboot of the system will restore the services. Note: NSR is not supported on the SRX Series and is therefore not affected by this vulnerability. The memory usage can be monitored using the below commands. user@host> show chassis routing-engine no-forwarding user@host> show system memory | no-more This issue affects: Juniper Networks Junos OS * 21.2 versions earlier than 21.2R3-S5; * 21.3 versions earlier than 21.3R3-S4; * 21.4 versions earlier than 21.4R3-S4; * 22.1 versions earlier than 22.1R3-S2; * 22.2 versions earlier than 22.2R3-S2; * 22.3 versions earlier than 22.3R2-S1, 22.3R3; * 22.4 versions earlier than 22.4R1-S2, 22.4R2. This issue does not affect Junos OS versions earlier than 20.4R3-S7. ",6.5,CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,"Juniper Junos 22.1, Juniper Junos 22.4, Juniper Junos 21.3, Juniper Junos 21.4, Juniper Junos 22.2, Juniper Junos 22.3, Juniper Junos 21.2" CVE-2023-40250,"Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in Hancom HCell on Windows allows Overflow Buffers.This issue affects HCell: 12.0.0.893. ",8.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,Microsoft Windows CVE-2023-52339,"In libebml before 1.4.5, an integer overflow in MemIOCallback.cpp can occur when reading or writing. It may result in buffer overflows.",6.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H,N/A CVE-2023-6040,"An out-of-bounds access vulnerability involving netfilter was reported and fixed as: f1082dd31fe4 (netfilter: nf_tables: Reject tables of unsupported family); While creating a new netfilter table, lack of a safeguard against invalid nf_tables family (pf) values within `nf_tables_newtable` function enables an attacker to achieve out-of-bounds access.",7.8,CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,"Debian Debian Linux 10.0, Linux Linux Kernel" CVE-2024-0454,"ELAN Match-on-Chip FPR solution has design fault about potential risk of valid SID leakage and enumeration with spoof sensor. This fault leads to that Windows Hello recognition would be bypass with cloning SID to cause broken account identity. Version which is lower than 3.0.12011.08009(Legacy)/3.3.12011.08103(ESS) would suffer this risk on DELL Inspiron platform.",6.0,CVSS:3.1/AV:P/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L,"Emc Elan Match-On-Chip Fpr Solution Firmware 3.0.12011.08009, Emc Elan Match-On-Chip Fpr Solution Firmware 3.3.12011.08103" CVE-2016-20021,"In Gentoo Portage before 3.0.47, there is missing PGP validation of executed code: the standalone emerge-webrsync downloads a .gpgsig file but does not perform signature verification. Unless emerge-webrsync is used, Portage is not vulnerable.",9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,N/A CVE-2022-48619,An issue was discovered in drivers/input/input.c in the Linux kernel before 5.17.10. An attacker can cause a denial of service (panic) because input_set_capability mishandles the situation in which an event code falls outside of a bitmap.,5.5,CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H,Linux Linux Kernel CVE-2022-4960,"A vulnerability, which was classified as problematic, has been found in cloudfavorites favorites-web 1.3.0. Affected by this issue is some unknown functionality of the component Nickname Handler. The manipulation leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-250238 is the identifier assigned to this vulnerability.",3.5,CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N,N/A CVE-2022-48620,uev (aka libuev) before 2.4.1 has a buffer overflow in epoll_wait if maxevents is a large number.,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,N/A CVE-2022-4961,A vulnerability was found in Weitong Mall 1.0.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file platform-shop\src\main\resources\com\platform\dao\OrderDao.xml. The manipulation of the argument sidx/order leads to sql injection. The associated identifier of this vulnerability is VDB-250243.,5.5,CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L,N/A CVE-2024-23171,"An issue was discovered in the CampaignEvents extension in MediaWiki before 1.35.14, 1.36.x through 1.39.x before 1.39.6, and 1.40.x before 1.40.2. The Special:EventDetails page allows XSS via the x-xss language setting for internationalization (i18n).",5.4,CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N,N/A CVE-2024-23172,"An issue was discovered in the CheckUser extension in MediaWiki before 1.35.14, 1.36.x through 1.39.x before 1.39.6, and 1.40.x before 1.40.2. XSS can occur via message definitions. e.g., in SpecialCheckUserLog.",5.4,CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N,N/A CVE-2024-23173,"An issue was discovered in the Cargo extension in MediaWiki before 1.35.14, 1.36.x through 1.39.x before 1.39.6, and 1.40.x before 1.40.2. The Special:Drilldown page allows XSS via artist, album, and position parameters because of applied filter values in drilldown/CargoAppliedFilter.php.",6.1,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N,N/A CVE-2024-23174,"An issue was discovered in the PageTriage extension in MediaWiki before 1.35.14, 1.36.x through 1.39.x before 1.39.6, and 1.40.x before 1.40.2. XSS can occur via the rev-deleted-user, pagetriage-tags-quickfilter-label, pagetriage-triage, pagetriage-filter-date-range-format-placeholder, pagetriage-filter-date-range-to, pagetriage-filter-date-range-from, pagetriage-filter-date-range-heading, pagetriage-filter-set-button, or pagetriage-filter-reset-button message.",5.4,CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N,N/A CVE-2024-23177,An issue was discovered in the WatchAnalytics extension in MediaWiki before 1.40.2. XSS can occur via the Special:PageStatistics page parameter.,6.1,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N,N/A CVE-2024-23178,An issue was discovered in the Phonos extension in MediaWiki before 1.40.2. PhonosButton.js allows i18n-based XSS via the phonos-purge-needed-error message.,5.4,CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N,N/A CVE-2024-23179,"An issue was discovered in the GlobalBlocking extension in MediaWiki before 1.40.2. For a Special:GlobalBlock?uselang=x-xss URI, i18n-based XSS can occur via the parentheses message. This affects subtitle links in buildSubtitleLinks.",6.1,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N,N/A CVE-2023-34061,"Cloud Foundry routing release versions from v0.163.0 to v0.283.0 are vulnerable to a DOS attack. An unauthenticated attacker can use this vulnerability to force route pruning and therefore degrade the service availability of the Cloud Foundry deployment. ",7.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,N/A CVE-2023-37117,A heap-use-after-free vulnerability was found in live555 version 2023.05.10 while handling the SETUP.,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,N/A CVE-2024-22027,Improper input validation vulnerability in WordPress Quiz Maker Plugin prior to 6.5.0.6 allows a remote authenticated attacker to perform a Denial of Service (DoS) attack against external services.,6.5,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H,N/A CVE-2023-31211,"Insufficient authentication flow in Checkmk before 2.2.0p18, 2.1.0p38 and 2.0.0p39 allows attacker to use locked credentials",8.8,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,N/A CVE-2023-40362,An issue was discovered in CentralSquare Click2Gov Building Permit before October 2023. Lack of access control protections allows remote attackers to arbitrarily delete the contractors from any user's account when the user ID and contractor information is known.,4.3,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N,N/A CVE-2023-50919,"An issue was discovered on GL.iNet devices before version 4.5.0. There is an NGINX authentication bypass via Lua string pattern matching. This affects A1300 4.4.6, AX1800 4.4.6, AXT1800 4.4.6, MT3000 4.4.6, MT2500 4.4.6, MT6000 4.5.0, MT1300 4.3.7, MT300N-V2 4.3.7, AR750S 4.3.7, AR750 4.3.7, AR300M 4.3.7, and B1300 4.3.7.",9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,"Gl-Inet Gl-Ar750 Firmware 4.3.7, Gl-Inet Gl-Mt300N-V2 Firmware 4.3.7, Gl-Inet Gl-Ar750S Firmware 4.4.6, Gl-Inet Gl-Mt1300 Firmware 4.4.6, Gl-Inet Gl-Mt3000 Firmware 4.3.7, Gl-Inet Gl-B1300 Firmware 4.3.7, Gl-Inet Gl-Mt2500 Firmware 4.4.6, Gl-Inet Gl-B1300 Firmware 4.4.6, Gl-Inet Gl-Ar750S Firmware 4.3.7, Gl-Inet Gl-Ar750 Firmware 4.4.6, Gl-Inet Gl-Mt6000 Firmware 4.3.7, Gl-Inet Gl-Ar300M Firmware 4.3.7, Gl-Inet Gl-Mt300N-V2 Firmware 4.4.6, Gl-Inet Gl-Mt3000 Firmware 4.4.6, Gl-Inet Gl-Ax1800 Firmware 4.3.7, Gl-Inet Gl-Mt2500 Firmware 4.3.7, Gl-Inet Gl-Ax1800 Firmware 4.4.6, Gl-Inet Gl-A1300 Firmware 4.3.7, Gl-Inet Gl-Ar300M Firmware 4.4.6, Gl-Inet Gl-A1300 Firmware 4.4.6, Gl-Inet Gl-Mt1300 Firmware 4.3.7, Gl-Inet Gl-Axt1800 Firmware 4.3.7, Gl-Inet Gl-Axt1800 Firmware 4.4.6, Gl-Inet Gl-Mt6000 Firmware 4.4.6" CVE-2023-50920,"An issue was discovered on GL.iNet devices before version 4.5.0. They assign the same session ID after each user reboot, allowing attackers to share session identifiers between different sessions and bypass authentication or access control measures. Attackers can impersonate legitimate users or perform unauthorized actions. This affects A1300 4.4.6, AX1800 4.4.6, AXT1800 4.4.6, MT3000 4.4.6, MT2500 4.4.6, MT6000 4.5.0, MT1300 4.3.7, MT300N-V2 4.3.7, AR750S 4.3.7, AR750 4.3.7, AR300M 4.3.7, and B1300 4.3.7.",5.5,CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N,"Gl-Inet Gl-Ar750 Firmware 4.3.7, Gl-Inet Gl-Mt300N-V2 Firmware 4.3.7, Gl-Inet Gl-Ar750S Firmware 4.4.6, Gl-Inet Gl-Mt1300 Firmware 4.4.6, Gl-Inet Gl-Mt3000 Firmware 4.3.7, Gl-Inet Gl-B1300 Firmware 4.3.7, Gl-Inet Gl-Mt2500 Firmware 4.4.6, Gl-Inet Gl-B1300 Firmware 4.4.6, Gl-Inet Gl-Ar750S Firmware 4.3.7, Gl-Inet Gl-Ar750 Firmware 4.4.6, Gl-Inet Gl-Mt6000 Firmware 4.3.7, Gl-Inet Gl-Ar300M Firmware 4.3.7, Gl-Inet Gl-Mt300N-V2 Firmware 4.4.6, Gl-Inet Gl-Mt3000 Firmware 4.4.6, Gl-Inet Gl-Ax1800 Firmware 4.3.7, Gl-Inet Gl-Mt2500 Firmware 4.3.7, Gl-Inet Gl-Ax1800 Firmware 4.4.6, Gl-Inet Gl-A1300 Firmware 4.3.7, Gl-Inet Gl-Ar300M Firmware 4.4.6, Gl-Inet Gl-A1300 Firmware 4.4.6, Gl-Inet Gl-Mt1300 Firmware 4.3.7, Gl-Inet Gl-Axt1800 Firmware 4.3.7, Gl-Inet Gl-Axt1800 Firmware 4.4.6, Gl-Inet Gl-Mt6000 Firmware 4.4.6" CVE-2023-6735,"Privilege escalation in mk_tsm agent plugin in Checkmk before 2.2.0p18, 2.1.0p38 and 2.0.0p39 allows local user to escalate privileges",8.8,CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H,N/A CVE-2023-6740,"Privilege escalation in jar_signature agent plugin in Checkmk before 2.2.0p18, 2.1.0p38 and 2.0.0p39 allows local user to escalate privileges",8.8,CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H,N/A CVE-2023-30014,"SQL Injection vulnerability in oretnom23 Judging Management System v1.0, allows remote attackers to execute arbitrary code and obtain sensitive information via sub_event_id parameter in sub_event_stat_update.php.",9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,N/A CVE-2023-30015,"SQL Injection vulnerability in oretnom23 Judging Management System v1.0, allows remote attackers to execute arbitrary code and obtain sensitive information via txtsearch parameter in review_search.php.",9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,N/A CVE-2023-30016,"SQL Injection vulnerability in oretnom23 Judging Management System v1.0, allows remote attackers to execute arbitrary code and obtain sensitive information via sub_event_id parameter in sub_event_details_edit.php.",9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,N/A CVE-2023-48909,"An issue was discovered in Jave2 version 3.3.1, allows attackers to execute arbitrary code via the FFmpeg function.",8.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,N/A CVE-2023-49568,"A denial of service (DoS) vulnerability was discovered in go-git versions prior to v5.11. This vulnerability allows an attacker to perform denial of service attacks by providing specially crafted responses from a Git server which triggers resource exhaustion in go-git clients. Applications using only the in-memory filesystem supported by go-git are not affected by this vulnerability. This is a go-git implementation issue and does not affect the upstream git cli. ",7.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,N/A CVE-2023-49569,"A path traversal vulnerability was discovered in go-git versions prior to v5.11. This vulnerability allows an attacker to create and amend files across the filesystem. In the worse case scenario, remote code execution could be achieved. Applications are only affected if they are using the ChrootOS https://pkg.go.dev/github.com/go-git/go-billy/v5/osfs#ChrootOS , which is the default when using ""Plain"" versions of Open and Clone funcs (e.g. PlainClone). Applications using BoundOS https://pkg.go.dev/github.com/go-git/go-billy/v5/osfs#BoundOS  or in-memory filesystems are not affected by this issue. This is a go-git implementation issue and does not affect the upstream git cli. ",9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,N/A CVE-2023-51790,Cross Site Scripting vulnerability in piwigo v.14.0.0 allows a remote attacker to obtain sensitive information via the lang parameter in the Admin Tools plug-in component.,6.1,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N,N/A CVE-2023-51806,File Upload vulnerability in Ujcms v.8.0.2 allows a local attacker to execute arbitrary code via a crafted file.,5.4,CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N,N/A CVE-2023-52026,TOTOlink EX1800T V9.1.0cu.2112_B20220316 was discovered to contain a remote command execution (RCE) vulnerability via the telnet_enabled parameter of the setTelnetCfg interface,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,Totolink Ex1800T Firmware 9.1.0cu.2112_b20220316 CVE-2023-0437,"When calling bson_utf8_validate on some inputs a loop with an exit condition that cannot be reached may occur, i.e. an infinite loop. This issue affects All MongoDB C Driver versions prior to versions 1.25.0.",5.3,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L,N/A CVE-2023-2030,"An issue has been discovered in GitLab CE/EE affecting all versions from 12.2 prior to 16.5.6, 16.6 prior to 16.6.4, and 16.7 prior to 16.7.2 in which an attacker could potentially modify the metadata of signed commits.",3.5,CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N,N/A CVE-2023-4812,"An issue has been discovered in GitLab EE affecting all versions starting from 15.3 before 16.5.6, all versions starting from 16.6 before 16.6.4, all versions starting from 16.7 before 16.7.2. The required CODEOWNERS approval could be bypassed by adding changes to a previously approved merge request.",7.6,CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:H/A:N,N/A CVE-2023-5356,"Incorrect authorization checks in GitLab CE/EE from all versions starting from 8.13 before 16.5.6, all versions starting from 16.6 before 16.6.4, all versions starting from 16.7 before 16.7.2, allows a user to abuse slack/mattermost integrations to execute slash commands as another user.",7.3,CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:N,N/A CVE-2023-6955,"A missing authorization check vulnerability exists in GitLab Remote Development affecting all versions prior to 16.5.6, 16.6 prior to 16.6.4 and 16.7 prior to 16.7.2. This condition allows an attacker to create a workspace in one group that is associated with an agent from another group.",6.6,CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:L/A:N,N/A CVE-2023-7028,"An issue has been discovered in GitLab CE/EE affecting all versions from 16.1 prior to 16.1.6, 16.2 prior to 16.2.9, 16.3 prior to 16.3.7, 16.4 prior to 16.4.5, 16.5 prior to 16.5.6, 16.6 prior to 16.6.4, and 16.7 prior to 16.7.2 in which user account password reset emails could be delivered to an unverified email address.",10.0,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N,N/A CVE-2023-49253,"Root user password is hardcoded into the device and cannot be changed in the user interface. ",9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,Hongdian H8951-4G-Esp Firmware CVE-2023-49254,"Authenticated user can execute arbitrary commands in the context of the root user by providing payload in the ""destination"" field of the network test tools. This is similar to the vulnerability CVE-2021-28151 mitigated on the user interface level by blacklisting characters with JavaScript, however, it can still be exploited by sending POST requests directly.",8.8,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,Hongdian H8951-4G-Esp Firmware CVE-2023-49255,"The router console is accessible without authentication at ""data"" field, and while a user needs to be logged in in order to modify the configuration, the session state is shared. If any other user is currently logged in, the anonymous user can execute commands in the context of the authenticated one. If the logged in user has administrative privileges, it is possible to use webadmin service configuration commands to create a new admin user with a chosen password.",9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,Hongdian H8951-4G-Esp Firmware CVE-2023-49256,It is possible to download the configuration backup without authorization and decrypt included passwords using hardcoded static key.,7.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,Hongdian H8951-4G-Esp Firmware CVE-2023-49257,An authenticated user is able to upload an arbitrary CGI-compatible file using the certificate upload utility and execute it with the root user privileges.,8.8,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,Hongdian H8951-4G-Esp Firmware CVE-2023-49258,"User browser may be forced to execute JavaScript and pass the authentication cookie to the attacker leveraging the XSS vulnerability located at ""/gui/terminal_tool.cgi"" in the ""data"" parameter.",6.1,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N,Hongdian H8951-4G-Esp Firmware CVE-2023-49259,"The authentication cookies are generated using an algorithm based on the username, hardcoded secret and the up-time, and can be guessed in a reasonable time.",7.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,Hongdian H8951-4G-Esp Firmware CVE-2023-49260,"An XSS attack can be performed by changing the MOTD banner and pointing the victim to the ""terminal_tool.cgi"" path. It can be used together with the vulnerability CVE-2023-49255.",6.1,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N,Hongdian H8951-4G-Esp Firmware CVE-2023-49261,"The ""tokenKey"" value used in user authorization is visible in the HTML source of the login page.",7.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,Hongdian H8951-4G-Esp Firmware CVE-2023-49262,"The authentication mechanism can be bypassed by overflowing the value of the Cookie ""authentication"" field, provided there is an active user session.",9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,Hongdian H8951-4G-Esp Firmware CVE-2023-51949,Verydows v2.0 was discovered to contain a Cross-Site Request Forgery (CSRF) via the component /protected/controller/backend/role_controller,8.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,N/A CVE-2023-28897,"The secret value used for access to critical UDS services of the MIB3 infotainment is hardcoded in the firmware. Vulnerability discovered on Škoda Superb III (3V3) - 2.0 TDI manufactured in 2022. ",4.0,CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N,Skoda-Auto Superb 3 Firmware 2022 CVE-2023-28898,"The Real-Time Streaming Protocol implementation in the MIB3 infotainment incorrectly handles requests to /logs URI, when the id parameter equals to zero. This issue allows an attacker connected to the in-vehicle Wi-Fi network to cause denial-of-service of the infotainment system, when the certain preconditions are met. Vulnerability discovered on Škoda Superb III (3V3) - 2.0 TDI manufactured in 2022. ",5.3,CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H,Skoda-Auto Superb 3 Firmware 2022 CVE-2023-51978,"In PHPGurukul Art Gallery Management System v1.1, ""Update Artist Image"" functionality of ""imageid"" parameter is vulnerable to SQL Injection.",6.5,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N,N/A CVE-2024-0459,A vulnerability has been found in Blood Bank & Donor Management 5.6 and classified as critical. This vulnerability affects unknown code of the file /admin/request-received-bydonar.php. The manipulation leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-250564.,4.7,CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L,N/A CVE-2024-0460,A vulnerability was found in code-projects Faculty Management System 1.0 and classified as critical. This issue affects some unknown processing of the file /admin/pages/student-print.php. The manipulation leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-250565 was assigned to this vulnerability.,6.3,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L,N/A CVE-2024-22492,"A stored XSS vulnerability exists in JFinalcms 5.0.0 via the /gusetbook/save contact parameter, which allows remote attackers to inject arbitrary web script or HTML.",5.4,CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N,N/A CVE-2024-22493,"A stored XSS vulnerability exists in JFinalcms 5.0.0 via the /gusetbook/save content parameter, which allows remote attackers to inject arbitrary web script or HTML.",5.4,CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N,N/A CVE-2024-22494,"A stored XSS vulnerability exists in JFinalcms 5.0.0 via the /gusetbook/save mobile parameter, which allows remote attackers to inject arbitrary web script or HTML.",5.4,CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N,N/A CVE-2023-28899,"By sending a specific reset UDS request via OBDII port of Skoda vehicles, it is possible to cause vehicle engine shutdown and denial of service of other vehicle components even when the vehicle is moving at a high speed. No safety critical functions affected. ",4.7,CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H,Skoda-Auto Superb 3 Firmware CVE-2023-31036,"NVIDIA Triton Inference Server for Linux and Windows contains a vulnerability where, when it is launched with the non-default command line option --model-control explicit, an attacker may use the model load API to cause a relative path traversal. A successful exploit of this vulnerability may lead to code execution, denial of service, escalation of privileges, information disclosure, and data tampering.",7.5,CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H,"Microsoft Windows, Linux Linux Kernel" CVE-2023-46805,"An authentication bypass vulnerability in the web component of Ivanti ICS 9.x, 22.x and Ivanti Policy Secure allows a remote attacker to access restricted resources by bypassing control checks.",8.2,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N,N/A CVE-2024-0461,A vulnerability was found in code-projects Online Faculty Clearance 1.0. It has been classified as critical. Affected is an unknown function of the file deactivate.php of the component HTTP POST Request Handler. The manipulation of the argument haydi leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-250566 is the identifier assigned to this vulnerability.,6.3,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L,N/A CVE-2024-21887,"A command injection vulnerability in web components of Ivanti Connect Secure (9.x, 22.x) and Ivanti Policy Secure (9.x, 22.x) allows an authenticated administrator to send specially crafted requests and execute arbitrary commands on the appliance.",9.1,CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H,N/A CVE-2024-0462,A vulnerability was found in code-projects Online Faculty Clearance 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /production/designee_view_status.php of the component HTTP POST Request Handler. The manipulation of the argument haydi leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-250567.,6.3,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L,N/A CVE-2024-0463,A vulnerability was found in code-projects Online Faculty Clearance 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /production/admin_view_info.php of the component HTTP POST Request Handler. The manipulation of the argument haydi leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-250568.,6.3,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L,N/A CVE-2023-31024,"NVIDIA DGX A100 BMC contains a vulnerability in the host KVM daemon, where an unauthenticated attacker may cause stack memory corruption by sending a specially crafted network packet. A successful exploit of this vulnerability may lead to arbitrary code execution, denial of service, information disclosure, and data tampering.",9.0,CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H,Nvidia Dgx A100 Firmware CVE-2023-31025,NVIDIA DGX A100 BMC contains a vulnerability where an attacker may cause an LDAP user injection. A successful exploit of this vulnerability may lead to information disclosure.,6.5,CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,Nvidia Dgx A100 Firmware CVE-2023-31029,"NVIDIA DGX A100 baseboard management controller (BMC) contains a vulnerability in the host KVM daemon, where an unauthenticated attacker may cause a stack overflow by sending a specially crafted network packet. A successful exploit of this vulnerability may lead to arbitrary code execution, denial of service, information disclosure, and data tampering.",9.3,CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H,Nvidia Dgx A100 Firmware CVE-2023-31030,"NVIDIA DGX A100 BMC contains a vulnerability in the host KVM daemon, where an unauthenticated attacker may cause a stack overflow by sending a specially crafted network packet. A successful exploit of this vulnerability may lead to arbitrary code execution, denial of service, information disclosure, and data tampering.",9.3,CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H,Nvidia Dgx A100 Firmware CVE-2023-31031,"NVIDIA DGX A100 SBIOS contains a vulnerability where a user may cause a heap-based buffer overflow by local access. A successful exploit of this vulnerability may lead to code execution, denial of service, information disclosure, and data tampering.",4.2,CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L,Nvidia Dgx A100 Firmware CVE-2023-31032,NVIDIA DGX A100 SBIOS contains a vulnerability where a user may cause a dynamic variable evaluation by local access. A successful exploit of this vulnerability may lead to denial of service.,7.5,CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H,Nvidia Dgx A100 Firmware CVE-2023-31033,"NVIDIA DGX A100 BMC contains a vulnerability where a user may cause a missing authentication issue for a critical function by an adjacent network . A successful exploit of this vulnerability may lead to escalation of privileges, code execution, denial of service, information disclosure, and data tampering.",6.8,CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H,Nvidia Dgx A100 Firmware CVE-2023-31034,"NVIDIA DGX A100 SBIOS contains a vulnerability where a local attacker can cause input validation checks to be bypassed by causing an integer overflow. A successful exploit of this vulnerability may lead to denial of service, information disclosure, and data tampering.",6.6,CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:H,Nvidia Dgx A100 Firmware CVE-2023-31035,"NVIDIA DGX A100 SBIOS contains a vulnerability where an attacker may cause an SMI callout vulnerability that could be used to execute arbitrary code at the SMM level. A successful exploit of this vulnerability may lead to code execution, denial of service, escalation of privileges, and information disclosure.",7.5,CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H,Nvidia Dgx A100 Firmware CVE-2023-6683,"A flaw was found in the QEMU built-in VNC server while processing ClientCutText messages. The qemu_clipboard_request() function can be reached before vnc_server_cut_text_caps() was called and had the chance to initialize the clipboard peer, leading to a NULL pointer dereference. This could allow a malicious authenticated VNC client to crash QEMU and trigger a denial of service.",6.5,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H,"Redhat Enterprise Linux 9.0, Redhat Enterprise Linux 8.0" CVE-2024-0464,A vulnerability classified as critical has been found in code-projects Online Faculty Clearance 1.0. This affects an unknown part of the file delete_faculty.php of the component HTTP GET Request Handler. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-250569 was assigned to this vulnerability.,6.3,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L,N/A CVE-2024-0465,A vulnerability classified as problematic was found in code-projects Employee Profile Management System 1.0. This vulnerability affects unknown code of the file download.php. The manipulation of the argument download_file leads to path traversal: '../filedir'. The exploit has been disclosed to the public and may be used. VDB-250570 is the identifier assigned to this vulnerability.,3.5,CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N,N/A CVE-2024-0466,"A vulnerability, which was classified as critical, has been found in code-projects Employee Profile Management System 1.0. This issue affects some unknown processing of the file file_table.php. The manipulation of the argument per_id leads to sql injection. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-250571.",5.5,CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L,N/A CVE-2010-10011,"A vulnerability, which was classified as problematic, was found in Acritum Femitter Server 1.04. Affected is an unknown function. The manipulation leads to path traversal. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-250446 is the identifier assigned to this vulnerability.",4.3,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N,N/A CVE-2024-0467,"A vulnerability, which was classified as problematic, was found in code-projects Employee Profile Management System 1.0. Affected is an unknown function of the file edit_position_query.php. The manipulation of the argument pos_name leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-250572.",3.5,CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N,N/A CVE-2024-22206,"Clerk helps developers build user management. Unauthorized access or privilege escalation due to a logic flaw in auth() in the App Router or getAuth() in the Pages Router. This vulnerability was patched in version 4.29.3. ",9.0,CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H,N/A CVE-2023-42463,"Wazuh is a free and open source platform used for threat prevention, detection, and response. This bug introduced a stack overflow hazard that could allow a local privilege escalation. This vulnerability was patched in version 4.5.3.",7.4,CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H,N/A CVE-2023-48297,"Discourse is a platform for community discussion. The message serializer uses the full list of expanded chat mentions (@all and @here) which can lead to a very long array of users. This issue was patched in versions 3.1.4 and beta 3.2.0.beta5. ",8.6,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H,N/A CVE-2023-49098,Discourse-reactions is a plugin that allows user to add their reactions to the post. Data about a user's reaction notifications could be exposed. This vulnerability was patched in commit 2c26939.,3.5,CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N,N/A CVE-2023-49099,"Discourse is a platform for community discussion. Under very specific circumstances, secure upload URLs associated with posts can be accessed by guest users even when login is required. This vulnerability has been patched in 3.2.0.beta4 and 3.1.4.",3.1,CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N,N/A CVE-2023-49801,"Lif Auth Server is a server for validating logins, managing information, and account recovery for Lif Accounts. The issue relates to the `get_pfp` and `get_banner` routes on Auth Server. The issue is that there is no check to ensure that the file that Auth Server is receiving through these URLs is correct. This could allow an attacker access to files they shouldn't have access to. This issue has been patched in version 1.4.0.",4.2,CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N,N/A CVE-2023-51698,Atril is a simple multi-page document viewer. Atril is vulnerable to a critical Command Injection Vulnerability. This vulnerability gives the attacker immediate access to the target system when the target user opens a crafted document or clicks on a crafted link/URL using a maliciously crafted CBT document which is a TAR archive. A patch is available at commit ce41df6.,9.6,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:L,N/A CVE-2024-0468,A vulnerability has been found in code-projects Fighting Cock Information System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /admin/action/new-father.php. The manipulation of the argument image leads to unrestricted upload. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-250573 was assigned to this vulnerability.,6.3,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L,N/A CVE-2024-0469,A vulnerability was found in code-projects Human Resource Integrated System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file update_personal_info.php. The manipulation of the argument sex leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-250574 is the identifier assigned to this vulnerability.,6.3,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L,N/A CVE-2024-0470,A vulnerability was found in code-projects Human Resource Integrated System 1.0. It has been classified as critical. This affects an unknown part of the file /admin_route/inc_service_credits.php. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-250575.,6.3,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L,N/A CVE-2024-0471,A vulnerability was found in code-projects Human Resource Integrated System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /admin_route/dec_service_credits.php. The manipulation of the argument date leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-250576.,6.3,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L,N/A CVE-2024-21654,"Rubygems.org is the Ruby community's gem hosting service. Rubygems.org users with MFA enabled would normally be protected from account takeover in the case of email account takeover. However, a workaround on the forgotten password form allows an attacker to bypass the MFA requirement and takeover the account. This vulnerability has been patched in commit 0b3272a.",4.8,CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N,N/A CVE-2024-21655,"Discourse is a platform for community discussion. For fields that are client editable, limits on sizes are not imposed. This allows a malicious actor to cause a Discourse instance to use excessive disk space and also often excessive bandwidth. The issue is patched 3.1.4 and 3.2.0.beta4.",4.3,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L,N/A CVE-2022-4962,"A vulnerability was found in Apollo 2.0.0/2.0.1 and classified as problematic. Affected by this issue is some unknown functionality of the file /users of the component Configuration Center. The manipulation leads to improper authorization. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The real existence of this vulnerability is still doubted at the moment. VDB-250430 is the identifier assigned to this vulnerability. NOTE: The maintainer explains that user data information like user id, name, and email are not sensitive.",4.3,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N,N/A CVE-2023-49647,"Improper access control in Zoom Desktop Client for Windows, Zoom VDI Client for Windows, and Zoom SDKs for Windows before version 5.16.10 may allow an authenticated user to conduct an escalation of privilege via local access.",8.8,CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H,Microsoft Windows CVE-2024-0472,A vulnerability was found in code-projects Dormitory Management System 1.0. It has been rated as problematic. This issue affects some unknown processing of the file modifyuser.php. The manipulation of the argument mname leads to information disclosure. The exploit has been disclosed to the public and may be used. The identifier VDB-250577 was assigned to this vulnerability.,3.5,CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N,N/A CVE-2024-0473,A vulnerability classified as critical has been found in code-projects Dormitory Management System 1.0. Affected is an unknown function of the file comment.php. The manipulation of the argument com leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-250578 is the identifier assigned to this vulnerability.,6.3,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L,N/A CVE-2024-21639,"CEF (Chromium Embedded Framework ) is a simple framework for embedding Chromium-based browsers in other applications. `CefLayeredWindowUpdaterOSR::OnAllocatedSharedMemory` does not check the size of the shared memory, which leads to out-of-bounds read outside the sandbox. This vulnerability was patched in commit 1f55d2e.",5.3,CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H,N/A CVE-2023-48166,A directory traversal vulnerability in the SOAP Server integrated in Atos Unify OpenScape Voice V10 before V10R3.26.1 allows a remote attacker to view the contents of arbitrary files in the local file system. An unauthenticated attacker might obtain sensitive files that allow for the compromise of the underlying system.,7.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,N/A CVE-2024-0230,A session management issue was addressed with improved checks. This issue is fixed in Magic Keyboard Firmware Update 2.0.6. An attacker with physical access to the accessory may be able to extract its Bluetooth pairing key and monitor Bluetooth traffic.,2.4,CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N,Apple Magic Keyboard Firmware CVE-2024-0474,A vulnerability classified as critical was found in code-projects Dormitory Management System 1.0. Affected by this vulnerability is an unknown functionality of the file login.php. The manipulation of the argument username leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-250579.,7.3,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L,N/A CVE-2024-23301,Relax-and-Recover (aka ReaR) through 2.7 creates a world-readable initrd when using GRUB_RESCUE=y. This allows local attackers to gain access to system secrets otherwise only readable by root.,5.5,CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N,"Fedoraproject Fedora 39, Suse Linux Enterprise 15.0, Redhat Enterprise Linux 9.0, Redhat Enterprise Linux 8.0" CVE-2024-0475,"A vulnerability, which was classified as critical, has been found in code-projects Dormitory Management System 1.0. Affected by this issue is some unknown functionality of the file modifyuser.php. The manipulation of the argument user_id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-250580.",6.3,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L,N/A CVE-2024-22137,"Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in MailMunch Constant Contact Forms by MailMunch allows Stored XSS.This issue affects Constant Contact Forms by MailMunch: from n/a through 2.0.11. ",6.5,CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L,N/A CVE-2024-22142,"Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Cozmoslabs Profile Builder Pro allows Reflected XSS.This issue affects Profile Builder Pro: from n/a through 3.10.0. ",7.1,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L,N/A CVE-2023-50072,A Stored Cross-Site Scripting (XSS) vulnerability exists in OpenKM version 7.1.40 (dbb6e88) With Professional Extension that allows an authenticated user to upload a note on a file which acts as a stored XSS payload. Any user who opens the note of a document file will trigger the XSS.,5.4,CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N,N/A CVE-2023-33472,"An issue was discovered in Scada-LTS v2.7.5.2 build 4551883606 and before, allows remote attackers with low-level authentication to escalate privileges, execute arbitrary code, and obtain sensitive information via Event Handlers function.",8.8,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,N/A CVE-2023-46942,"Lack of authentication in NPM's package @evershop/evershop before version 1.0.0-rc.8, allows remote attackers to obtain sensitive information via improper authorization in GraphQL endpoints.",7.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,N/A CVE-2023-46943,"An issue was discovered in NPM's package @evershop/evershop before version 1.0.0-rc.8. The HMAC secret used for generating tokens is hardcoded as ""secret"". A weak HMAC secret poses a risk because attackers can use the predictable secret to create valid JSON Web Tokens (JWTs), allowing them access to important information and actions within the application.",9.1,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N,N/A CVE-2023-51804,An issue in rymcu forest v.0.02 allows a remote attacker to obtain sensitive information via manipulation of the HTTP body URL in the com.rymcu.forest.web.api.common.UploadController file.,7.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,N/A CVE-2023-51805,SQL Injection vulnerability in TDuckCLoud tduck-platform v.4.0 allows a remote attacker to obtain sensitive information via the getFormKey parameter in the search function of FormDataMysqlService.java file.,6.5,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N,N/A CVE-2023-51062,An unauthenticated log file read in the component log-smblog-save of QStar Archive Solutions RELEASE_3-0 Build 7 Patch 0 allows attackers to disclose the SMB Log contents via executing a crafted command.,5.3,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N,N/A CVE-2023-51063,QStar Archive Solutions Release RELEASE_3-0 Build 7 Patch 0 was discovered to contain a DOM Based Reflected Cross Site Scripting (XSS) vulnerability within the component qnme-ajax?method=tree_level.,8.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,N/A CVE-2023-51064,QStar Archive Solutions Release RELEASE_3-0 Build 7 Patch 0 was discovered to contain a DOM Based reflected XSS vulnerability within the component qnme-ajax?method=tree_table.,6.1,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N,N/A CVE-2023-51065,Incorrect access control in QStar Archive Solutions Release RELEASE_3-0 Build 7 Patch 0 allows unauthenticated attackers to obtain system backups and other sensitive information from the QStar Server.,7.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,N/A CVE-2023-51066,An authenticated remote code execution vulnerability in QStar Archive Solutions Release RELEASE_3-0 Build 7 Patch 0 allows attackers to arbitrarily execute commands.,8.8,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,N/A CVE-2023-51067,An unauthenticated reflected cross-site scripting (XSS) vulnerability in QStar Archive Solutions Release RELEASE_3-0 Build 7 allows attackers to execute arbitrary javascript on a victim's browser via a crafted link.,6.1,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N,N/A CVE-2023-51068,An authenticated reflected cross-site scripting (XSS) vulnerability in QStar Archive Solutions Release RELEASE_3-0 Build 7 allows attackers to execute arbitrary javascript on a victim's browser via a crafted link.,5.4,CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N,N/A CVE-2023-51070,An access control issue in QStar Archive Solutions Release RELEASE_3-0 Build 7 Patch 0 allows unauthenticated attackers to arbitrarily adjust sensitive SMB settings on the QStar Server.,7.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N,N/A CVE-2023-51071,An access control issue in QStar Archive Solutions Release RELEASE_3-0 Build 7 Patch 0 allows unauthenticated attackers to arbitrarily disable the SMB service on a victim's Qstar instance by executing a specific command in a link.,6.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L,N/A CVE-2023-52288,"An issue was discovered in the flaskcode package through 0.0.8 for Python. An unauthenticated directory traversal, exploitable with a GET request to a /resource-data/.txt URI (from views.py), allows attackers to read arbitrary files.",7.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,N/A CVE-2023-52289,"An issue was discovered in the flaskcode package through 0.0.8 for Python. An unauthenticated directory traversal, exploitable with a POST request to a /update-resource-data/ URI (from views.py), allows attackers to write to arbitrary files.",7.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N,N/A CVE-2024-0476,"A vulnerability, which was classified as problematic, was found in Blood Bank & Donor Management 1.0. This affects an unknown part of the file request-received-bydonar.php. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-250581 was assigned to this vulnerability.",2.4,CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N,N/A CVE-2024-0477,A vulnerability has been found in code-projects Fighting Cock Information System 1.0 and classified as critical. This vulnerability affects unknown code of the file /admin/action/update-deworm.php. The manipulation of the argument usage_deworm leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-250582 is the identifier assigned to this vulnerability.,6.3,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L,N/A CVE-2024-0478,A vulnerability was found in code-projects Fighting Cock Information System 1.0 and classified as critical. This issue affects some unknown processing of the file /admin/pages/edit_chicken.php. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-250583.,6.3,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L,N/A CVE-2024-0479,A vulnerability was found in Taokeyun up to 1.0.5. It has been classified as critical. Affected is the function login of the file application/index/controller/m/User.php of the component HTTP POST Request Handler. The manipulation of the argument username leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-250584.,7.3,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L,N/A CVE-2024-0251,"The Advanced Woo Search plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the search parameter in all versions up to, and including, 2.96 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. This only affects sites when the Dynamic Content for Elementor plugin is also installed.",6.1,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N,N/A CVE-2024-0480,A vulnerability was found in Taokeyun up to 1.0.5. It has been declared as critical. Affected by this vulnerability is the function index of the file application/index/controller/m/Drs.php of the component HTTP POST Request Handler. The manipulation of the argument cid leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-250585 was assigned to this vulnerability.,7.3,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L,N/A CVE-2024-21640,"Chromium Embedded Framework (CEF) is a simple framework for embedding Chromium-based browsers in other applications.`CefVideoConsumerOSR::OnFrameCaptured` does not check `pixel_format` properly, which leads to out-of-bounds read out of the sandbox. This vulnerability was patched in commit 1f55d2e. ",5.4,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N,N/A CVE-2024-22209,Open edX Platform is a service-oriented platform for authoring and delivering online learning. A user with a JWT and more limited scopes could call endpoints exceeding their access. This vulnerability has been patched in commit 019888f.,6.4,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N,N/A CVE-2024-0481,A vulnerability was found in Taokeyun up to 1.0.5. It has been rated as critical. Affected by this issue is the function shopGoods of the file application/index/controller/app/store/Goods.php of the component HTTP POST Request Handler. The manipulation of the argument keyword leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-250586 is the identifier assigned to this vulnerability.,6.3,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L,N/A CVE-2024-0482,A vulnerability classified as critical has been found in Taokeyun up to 1.0.5. This affects the function index of the file application/index/controller/app/Video.php of the component HTTP POST Request Handler. The manipulation of the argument cid leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-250587.,6.3,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L,N/A CVE-2024-0483,A vulnerability classified as critical was found in Taokeyun up to 1.0.5. This vulnerability affects the function index of the file application/index/controller/app/Task.php of the component HTTP POST Request Handler. The manipulation of the argument cid leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-250588.,6.3,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L,N/A CVE-2024-0484,"A vulnerability, which was classified as critical, has been found in code-projects Fighting Cock Information System 1.0. This issue affects some unknown processing of the file admin/action/update_mother.php. The manipulation of the argument age_mother leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-250589 was assigned to this vulnerability.",6.3,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L,N/A CVE-2024-0485,"A vulnerability, which was classified as critical, was found in code-projects Fighting Cock Information System 1.0. Affected is an unknown function of the file admin/pages/tables/add_con.php. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-250590 is the identifier assigned to this vulnerability.",6.3,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L,N/A CVE-2024-0486,A vulnerability has been found in code-projects Fighting Cock Information System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /admin/action/add_con.php. The manipulation of the argument chicken leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-250591.,6.3,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L,N/A CVE-2024-0487,A vulnerability was found in code-projects Fighting Cock Information System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file /admin/action/delete-vaccine.php. The manipulation of the argument ref leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-250592.,6.3,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L,N/A CVE-2024-0488,A vulnerability was found in code-projects Fighting Cock Information System 1.0. It has been classified as critical. This affects an unknown part of the file /admin/action/new-feed.php. The manipulation of the argument type_feed leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-250593 was assigned to this vulnerability.,6.3,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L,N/A CVE-2024-0489,A vulnerability was found in code-projects Fighting Cock Information System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /admin/action/edit_chicken.php. The manipulation of the argument ref leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-250594 is the identifier assigned to this vulnerability.,6.3,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L,N/A CVE-2024-0490,A vulnerability was found in Huaxia ERP up to 3.1. It has been rated as problematic. This issue affects some unknown processing of the file /user/getAllList. The manipulation leads to information disclosure. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 3.2 is able to address this issue. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-250595.,5.3,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N,N/A CVE-2024-0491,A vulnerability classified as problematic has been found in Huaxia ERP up to 3.1. Affected is an unknown function of the file src/main/java/com/jsh/erp/controller/UserController.java. The manipulation leads to weak password recovery. It is possible to launch the attack remotely. Upgrading to version 3.2 is able to address this issue. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-250596.,5.3,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N,N/A CVE-2024-0492,A vulnerability classified as critical was found in Kashipara Billing Software 1.0. Affected by this vulnerability is an unknown functionality of the file buyer_detail_submit.php of the component HTTP POST Request Handler. The manipulation of the argument gstn_no leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-250597 was assigned to this vulnerability.,6.3,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L,N/A CVE-2024-0493,"A vulnerability, which was classified as critical, has been found in Kashipara Billing Software 1.0. Affected by this issue is some unknown functionality of the file submit_delivery_list.php of the component HTTP POST Request Handler. The manipulation of the argument customer_details leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-250598 is the identifier assigned to this vulnerability.",6.3,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L,N/A CVE-2024-0494,"A vulnerability, which was classified as critical, was found in Kashipara Billing Software 1.0. This affects an unknown part of the file material_bill.php of the component HTTP POST Request Handler. The manipulation of the argument itemtypeid leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-250599.",6.3,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L,N/A CVE-2024-0495,A vulnerability has been found in Kashipara Billing Software 1.0 and classified as critical. This vulnerability affects unknown code of the file party_submit.php of the component HTTP POST Request Handler. The manipulation of the argument party_name leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-250600.,6.3,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L,N/A CVE-2024-0496,A vulnerability was found in Kashipara Billing Software 1.0 and classified as critical. This issue affects some unknown processing of the file item_list_edit.php of the component HTTP POST Request Handler. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-250601 was assigned to this vulnerability.,6.3,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L,N/A CVE-2024-0497,A vulnerability was found in Campcodes Student Information System 1.0. It has been classified as critical. Affected is an unknown function of the file /classes/Users.php?f=save. The manipulation of the argument username leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-250602 is the identifier assigned to this vulnerability.,6.3,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L,N/A CVE-2024-0498,A vulnerability was found in Project Worlds Lawyer Management System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file searchLawyer.php. The manipulation of the argument experience leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-250603.,6.3,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L,N/A CVE-2024-0499,"A vulnerability, which was classified as problematic, has been found in SourceCodester House Rental Management System 1.0. This issue affects some unknown processing of the file index.php. The manipulation of the argument page leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-250607.",2.4,CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N,N/A CVE-2024-0500,"A vulnerability, which was classified as problematic, was found in SourceCodester House Rental Management System 1.0. Affected is an unknown function of the component Manage Tenant Details. The manipulation of the argument Name leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-250608.",2.4,CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N,N/A CVE-2024-0501,A vulnerability has been found in SourceCodester House Rental Management System 1.0 and classified as problematic. Affected by this vulnerability is an unknown functionality of the component Manage Invoice Details. The manipulation of the argument Invoice leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-250609 was assigned to this vulnerability.,2.4,CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N,N/A CVE-2024-0502,A vulnerability was found in SourceCodester House Rental Management System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file manage_user.php of the component Edit User. The manipulation of the argument id/name/username leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-250610 is the identifier assigned to this vulnerability.,4.7,CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L,N/A CVE-2024-0503,A vulnerability was found in code-projects Online FIR System 1.0. It has been classified as problematic. This affects an unknown part of the file registercomplaint.php. The manipulation of the argument Name/Address leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-250611.,3.5,CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N,N/A CVE-2024-0504,A vulnerability has been found in code-projects Simple Online Hotel Reservation System 1.0 and classified as problematic. This vulnerability affects unknown code of the file add_reserve.php of the component Make a Reservation Page. The manipulation of the argument Firstname/Lastname with the input leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-250618 is the identifier assigned to this vulnerability.,3.5,CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N,N/A CVE-2024-0505,A vulnerability was found in ZhongFuCheng3y Austin 1.0 and classified as critical. This issue affects the function getFile of the file com/java3y/austin/web/controller/MaterialController.java of the component Upload Material Menu. The manipulation leads to unrestricted upload. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-250619.,5.5,CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L,N/A CVE-2024-0510,"A vulnerability, which was classified as critical, has been found in HaoKeKeJi YiQiNiu up to 3.1. Affected by this issue is the function http_post of the file /application/pay/controller/Api.php. The manipulation of the argument url leads to server-side request forgery. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-250652.",7.3,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L,N/A CVE-2024-0522,A vulnerability was found in Allegro RomPager 4.01. It has been classified as problematic. Affected is an unknown function of the file usertable.htm?action=delete of the component HTTP POST Request Handler. The manipulation of the argument username leads to cross-site request forgery. It is possible to launch the attack remotely. Upgrading to version 4.30 is able to address this issue. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-250692. NOTE: The vendor explains that this is a very old issue that got fixed 20 years ago but without a public disclosure.,4.3,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N,N/A CVE-2024-0523,A vulnerability was found in CmsEasy up to 7.7.7. It has been declared as critical. Affected by this vulnerability is the function getslide_child_action in the library lib/admin/language_admin.php. The manipulation of the argument sid leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-250693 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.,6.3,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L,N/A CVE-2024-0524,A vulnerability was found in CXBSoft Url-shorting up to 1.3.1. It has been rated as critical. Affected by this issue is some unknown functionality of the file index.php. The manipulation of the argument url leads to sql injection. The exploit has been disclosed to the public and may be used. VDB-250694 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.,5.5,CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L,N/A CVE-2024-0525,A vulnerability classified as critical has been found in CXBSoft Url-shorting up to 1.3.1. This affects an unknown part of the file /pages/long_s_short.php of the component HTTP POST Request Handler. The manipulation of the argument longurl leads to sql injection. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-250695. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.,5.5,CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L,N/A CVE-2024-0526,A vulnerability classified as critical was found in CXBSoft Url-shorting up to 1.3.1. This vulnerability affects unknown code of the file /pages/short_to_long.php of the component HTTP POST Request Handler. The manipulation of the argument shorturl leads to sql injection. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-250696. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.,5.5,CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L,N/A CVE-2024-0527,"A vulnerability, which was classified as critical, has been found in CXBSoft Url-shorting up to 1.3.1. This issue affects some unknown processing of the file /admin/pages/update_go.php of the component HTTP POST Request Handler. The manipulation of the argument version leads to sql injection. The exploit has been disclosed to the public and may be used. The identifier VDB-250697 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.",6.3,CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L,N/A CVE-2024-0528,"A vulnerability, which was classified as critical, was found in CXBSoft Post-Office 1.0. Affected is an unknown function of the file /admin/pages/update_go.php of the component HTTP POST Request Handler. The manipulation of the argument version leads to sql injection. The exploit has been disclosed to the public and may be used. VDB-250698 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.",5.5,CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L,N/A CVE-2024-0529,A vulnerability has been found in CXBSoft Post-Office up to 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /apps/login_auth.php of the component HTTP POST Request Handler. The manipulation of the argument username_login leads to sql injection. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-250699. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.,5.5,CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L,N/A CVE-2024-0530,A vulnerability was found in CXBSoft Post-Office up to 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file /apps/reg_go.php of the component HTTP POST Request Handler. The manipulation of the argument username_reg leads to sql injection. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-250700. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.,5.5,CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L,N/A CVE-2024-0531,A vulnerability was found in Tenda A15 15.13.07.13. It has been classified as critical. This affects an unknown part of the file /goform/setBlackRule of the component Web-based Management Interface. The manipulation of the argument deviceList leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-250701 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.,7.2,CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H,Tenda A15 Firmware 15.13.07.13 CVE-2024-0532,A vulnerability was found in Tenda A15 15.13.07.13. It has been declared as critical. This vulnerability affects the function set_repeat5 of the file /goform/WifiExtraSet of the component Web-based Management Interface. The manipulation of the argument wpapsk_crypto2_4g/wpapsk_crypto5g leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.,7.2,CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H,Tenda A15 Firmware 15.13.07.13 CVE-2023-48383,"NetVision Information airPASS has a path traversal vulnerability within its parameter in a specific URL. An unauthenticated remote attacker can exploit this vulnerability to bypass authentication and download arbitrary system files.",7.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,N/A CVE-2024-0533,A vulnerability was found in Tenda A15 15.13.07.13. It has been rated as critical. This issue affects some unknown processing of the file /goform/SetOnlineDevName of the component Web-based Management Interface. The manipulation of the argument devName leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-250703. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.,7.2,CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H,Tenda A15 Firmware 15.13.07.13 CVE-2024-0534,A vulnerability classified as critical has been found in Tenda A15 15.13.07.13. Affected is an unknown function of the file /goform/SetOnlineDevName of the component Web-based Management Interface. The manipulation of the argument mac leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-250704. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.,7.2,CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H,Tenda A15 Firmware 15.13.07.13 CVE-2024-0535,A vulnerability classified as critical was found in Tenda PA6 1.0.1.21. Affected by this vulnerability is the function cgiPortMapAdd of the file /portmap of the component httpd. The manipulation of the argument groupName leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-250705 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.,8.8,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,Tendacn Pa6 Firmware 1.0.1.21 CVE-2024-0536,"A vulnerability, which was classified as critical, has been found in Tenda W9 1.0.0.7(4456). Affected by this issue is the function setWrlAccessList of the component httpd. The manipulation of the argument ssidIndex leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-250706 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.",8.8,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,Tenda W9 Firmware 1.0.0.7\(4456\) CVE-2024-0537,"A vulnerability, which was classified as critical, was found in Tenda W9 1.0.0.7(4456). This affects the function setWrlBasicInfo of the component httpd. The manipulation of the argument ssidIndex leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-250707. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.",8.8,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,Tenda W9 Firmware 1.0.0.7\(4456\) CVE-2024-0538,A vulnerability has been found in Tenda W9 1.0.0.7(4456) and classified as critical. This vulnerability affects the function formQosManage_auto of the component httpd. The manipulation of the argument ssidIndex leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-250708. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.,8.8,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,Tenda W9 Firmware 1.0.0.7\(4456\) CVE-2024-0552,Intumit inc. SmartRobot's web framwork has a remote code execution vulnerability. An unauthorized remote attacker can exploit this vulnerability to execute arbitrary commands on the remote server.,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,Intumit Smartrobot Firmware CVE-2024-0539,A vulnerability was found in Tenda W9 1.0.0.7(4456) and classified as critical. This issue affects the function formQosManage_user of the component httpd. The manipulation of the argument ssidIndex leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-250709 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.,8.8,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,Tenda W9 Firmware 1.0.0.7\(4456\) CVE-2024-0540,A vulnerability was found in Tenda W9 1.0.0.7(4456). It has been classified as critical. Affected is the function formOfflineSet of the component httpd. The manipulation of the argument ssidIndex leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-250710 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.,6.3,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L,Tenda W9 Firmware 1.0.0.7\(4456\) CVE-2024-0541,A vulnerability was found in Tenda W9 1.0.0.7(4456). It has been declared as critical. Affected by this vulnerability is the function formAddSysLogRule of the component httpd. The manipulation of the argument sysRulenEn leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-250711. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.,8.8,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,Tenda W9 Firmware 1.0.0.7\(4456\) CVE-2024-0542,A vulnerability was found in Tenda W9 1.0.0.7(4456). It has been rated as critical. Affected by this issue is the function formWifiMacFilterGet of the component httpd. The manipulation of the argument index leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-250712. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.,8.8,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,Tenda W9 Firmware 1.0.0.7\(4456\) CVE-2024-0543,A vulnerability classified as critical has been found in CodeAstro Real Estate Management System up to 1.0. This affects an unknown part of the file propertydetail.php. The manipulation of the argument pid leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-250713 was assigned to this vulnerability.,6.3,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L,N/A CVE-2024-0545,A vulnerability classified as problematic was found in CodeCanyon RISE Rise Ultimate Project Manager 3.5.3. This vulnerability affects unknown code of the file /index.php/signin. The manipulation of the argument redirect with the input http://evil.com leads to open redirect. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-250714 is the identifier assigned to this vulnerability.,5.3,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N,N/A CVE-2024-0546,"A vulnerability, which was classified as problematic, has been found in EasyFTP 1.7.0. This issue affects some unknown processing of the component LIST Command Handler. The manipulation leads to denial of service. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-250715.",5.3,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L,N/A CVE-2020-36770,pkg_postinst in the Gentoo ebuild for Slurm through 22.05.3 unnecessarily calls chown to assign root's ownership on files in the live root filesystem. This could be exploited by the slurm user to become the owner of root-owned files.,9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,N/A CVE-2024-0547,A vulnerability has been found in Ability FTP Server 2.34 and classified as problematic. Affected by this vulnerability is an unknown functionality of the component APPE Command Handler. The manipulation leads to denial of service. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-250717 was assigned to this vulnerability.,5.3,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L,N/A CVE-2024-0548,A vulnerability was found in FreeFloat FTP Server 1.0 and classified as problematic. Affected by this issue is some unknown functionality of the component SIZE Command Handler. The manipulation leads to denial of service. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-250718 is the identifier assigned to this vulnerability.,5.3,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L,N/A CVE-2024-22028,"Insufficient technical documentation issue exists in thermal camera TMC series all firmware versions. The user of the affected product is not aware of the internally saved data. By accessing the affected product physically, an attacker may retrieve the internal data.",4.6,CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,"3Rrr-Btob 3R-Tmc04 Firmware, 3Rrr-Btob 3R-Tmc05 Firmware, 3Rrr-Btob 3R-Tmc01 Firmware, 3Rrr-Btob 3R-Tmc03 Firmware, 3Rrr-Btob 3R-Tmc06 Firmware, 3Rrr-Btob 3R-Tmc02 Firmware" CVE-2023-46749,"Apache Shiro before 1.13.0 or 2.0.0-alpha-4, may be susceptible to a path traversal attack that results in an authentication bypass when used together with path rewriting Mitigation: Update to Apache Shiro 1.13.0+ or 2.0.0-alpha-4+, or ensure `blockSemicolon` is enabled (this is the default). ",6.5,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N,N/A CVE-2023-50290,"Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Apache Solr. The Solr Metrics API publishes all unprotected environment variables available to each Apache Solr instance. Users are able to specify which environment variables to hide, however, the default list is designed to work for known secret Java system properties. Environment variables cannot be strictly defined in Solr, like Java system properties can be, and may be set for the entire host, unlike Java system properties which are set per-Java-proccess. The Solr Metrics API is protected by the ""metrics-read"" permission. Therefore, Solr Clouds with Authorization setup will only be vulnerable via users with the ""metrics-read"" permission. This issue affects Apache Solr: from 9.0.0 before 9.3.0. Users are recommended to upgrade to version 9.3.0 or later, in which environment variables are not published via the Metrics API. ",6.5,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N,N/A CVE-2023-6915,A Null pointer dereference problem was found in ida_free in lib/idr.c in the Linux Kernel. This issue may allow an attacker using this library to cause a denial of service problem due to a missing check at a function return.,6.2,CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,"Redhat Enterprise Linux 9.0, Redhat Enterprise Linux 8.0, Linux Linux Kernel, Linux Linux Kernel 6.7" CVE-2023-46226,"Remote Code Execution vulnerability in Apache IoTDB.This issue affects Apache IoTDB: from 1.0.0 through 1.2.2. Users are recommended to upgrade to version 1.3.0, which fixes the issue.",9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,N/A CVE-2023-4001,"An authentication bypass flaw was found in GRUB due to the way that GRUB uses the UUID of a device to search for the configuration file that contains the password hash for the GRUB password protection feature. An attacker capable of attaching an external drive such as a USB stick containing a file system with a duplicate UUID (the same as in the ""/boot/"" file system) can bypass the GRUB password protection feature on UEFI systems, which enumerate removable drives before non-removable ones. This issue was introduced in a downstream patch in Red Hat's version of grub2 and does not affect the upstream package.",6.8,CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,"Fedoraproject Fedora 39, Fedoraproject Fedora 38, Redhat Enterprise Linux 9.0" CVE-2023-5253,"A missing authentication check in the WebSocket channel used for the Check Point IoT integration in Nozomi Networks Guardian and CMC, may allow an unauthenticated attacker to obtain assets data without authentication. Malicious unauthenticated users with knowledge on the underlying system may be able to extract limited asset information.",5.3,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N,N/A CVE-2024-20709,Acrobat Reader T5 (MSFT Edge) versions 120.0.2210.91 and earlier are affected by an Improper Input Validation vulnerability. An unauthenticated attacker could leverage this vulnerability to achieve an application denial-of-service in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.,5.5,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H,N/A CVE-2024-20721,Acrobat Reader T5 (MSFT Edge) versions 120.0.2210.91 and earlier are affected by an Improper Input Validation vulnerability. An unauthenticated attacker could leverage this vulnerability to achieve an application denial-of-service in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.,5.5,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H,N/A CVE-2023-42134,"PAX Android based POS devices with PayDroid_8.1.0_Sagittarius_V11.1.45_20230314 or earlier can allow the signed partition overwrite and subsequently local code execution via hidden command. The attacker must have physical USB access to the device in order to exploit this vulnerability. ",6.8,CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,Paxtechnology Paydroid CVE-2023-42135,"PAX A920Pro/A50 devices with PayDroid_8.1.0_Sagittarius_V11.1.50_20230614 or earlier can allow local code execution via parameter injection by bypassing the input validation when flashing a specific partition. The attacker must have physical USB access to the device in order to exploit this vulnerability.",6.8,CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,Paxtechnology Paydroid CVE-2023-42136,"PAX Android based POS devices with PayDroid_8.1.0_Sagittarius_V11.1.50_20230614 or earlier can allow the execution of arbitrary commands with system account privilege by shell injection starting with a specific word. The attacker must have shell access to the device in order to exploit this vulnerability.",7.8,CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,Paxtechnology Paydroid CVE-2023-42137,"PAX Android based POS devices with PayDroid_8.1.0_Sagittarius_V11.1.50_20230614 or earlier can allow for command execution with high privileges by using malicious symlinks. The attacker must have shell access to the device in order to exploit this vulnerability.",7.8,CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,Paxtechnology Paydroid CVE-2023-4818,"PAX A920 device allows to downgrade bootloader due to a bug in its version check. The signature is correctly checked and only bootloader signed by PAX can be used.  The attacker must have physical USB access to the device in order to exploit this vulnerability.",7.6,CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H,Paxtechnology Paydroid 7.1.2_aquarius_11.1.50_20230614 CVE-2023-4925,"The Easy Forms for Mailchimp WordPress plugin through 6.8.10 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Cross-Site Scripting attacks even when unfiltered_html is disallowed",4.8,CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N,N/A CVE-2023-50729,"Traccar is an open source GPS tracking system. Prior to 5.11, Traccar is affected by an unrestricted file upload vulnerability in File feature allows attackers to execute arbitrary code on the server. This vulnerability is more prevalent because Traccar is recommended to run web servers as root user. It is also more dangerous because it can write or overwrite files in arbitrary locations. Version 5.11 was published to fix this vulnerability.",8.4,CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H,N/A CVE-2023-5905,"The DeMomentSomTres WordPress Export Posts With Images WordPress plugin through 20220825 does not check authorization of requests to export the blog data, allowing any logged in user, such as subscribers to export the contents of the blog, including restricted and unpublished posts, as well as passwords of protected posts.",8.1,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N,N/A CVE-2023-6029,"The EazyDocs WordPress plugin before 2.3.6 does not have authorization and CSRF checks when handling documents and does not ensure that they are documents from the plugin, allowing unauthenticated users to delete arbitrary posts, as well as add and delete documents/sections.",7.5,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N,N/A CVE-2023-6048,"The Estatik Real Estate Plugin WordPress plugin before 4.1.1 does not prevent user with low privileges on the site, like subscribers, from setting any of the site's options to 1, which could be used to break sites and lead to DoS when certain options are reset",6.5,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H,N/A CVE-2023-6049,"The Estatik Real Estate Plugin WordPress plugin before 4.1.1 unserializes user input via some of its cookies, which could allow unauthenticated users to perform PHP Object Injection when a suitable gadget chain is present on the blog",9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,N/A CVE-2023-6050,"The Estatik Real Estate Plugin WordPress plugin before 4.1.1 does not sanitise and escape various parameters and generated URLs before outputting them back in attributes, leading to Reflected Cross-Site Scripting which could be used against high privilege users such as admin",6.1,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N,N/A CVE-2023-6066,"The WP Custom Widget area WordPress plugin through 1.2.5 does not properly apply capability and nonce checks on any of its AJAX action callback functions, which could allow attackers with subscriber+ privilege to create, delete or modify menus on the site.",4.3,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N,N/A CVE-2023-6163,"The WP Crowdfunding WordPress plugin before 2.1.10 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)",4.8,CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N,N/A CVE-2023-6620,"The POST SMTP Mailer WordPress plugin before 2.8.7 does not properly sanitise and escape several parameters before using them in SQL statements, leading to a SQL injection exploitable by high privilege users such as admin.",7.2,CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H,N/A CVE-2023-6623,"The Essential Blocks WordPress plugin before 4.4.3 does not prevent unauthenticated attackers from overwriting local variables when rendering templates over the REST API, which may lead to Local File Inclusion attacks.",9.8,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,N/A CVE-2023-6843,"The easy.jobs- Best Recruitment Plugin for Job Board Listing, Manager, Career Page for Elementor & Gutenberg WordPress plugin before 2.4.7 does not properly secure some of its AJAX actions, allowing any logged-in users to modify its settings.",4.3,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N,N/A CVE-2023-6941,"The Keap Official Opt-in Forms WordPress plugin through 1.0.11 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example, in multisite setup).",4.8,CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N,N/A CVE-2023-6991,"The JSM file_get_contents() Shortcode WordPress plugin before 2.7.1 does not validate one of its shortcode's parameters before making a request to it, which could allow users with contributor role and above to perform SSRF attacks.",8.8,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,N/A CVE-2024-0314,"XSS vulnerability in FireEye Central Management affecting version 9.1.1.956704, which could allow an attacker to modify special HTML elements in the application and cause a reflected XSS, leading to a session hijacking.",5.4,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N,N/A CVE-2024-0315,Remote file inclusion vulnerability in FireEye Central Management affecting version 9.1.1.956704. This vulnerability allows an attacker to upload a malicious PDF file to the system during the report creation process.,6.6,CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L,N/A CVE-2024-0316,"Improper cleanup vulnerability in exceptions thrown in FireEye Endpoint Security, affecting version 5.2.0.958244. This vulnerability could allow an attacker to send multiple request packets to the containment_notify/preview parameter, which could lead to a service outage.",6.8,CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H,N/A CVE-2024-22207,"fastify-swagger-ui is a Fastify plugin for serving Swagger UI. Prior to 2.1.0, the default configuration of `@fastify/swagger-ui` without `baseDir` set will lead to all files in the module's directory being exposed via http routes served by the module. The vulnerability is fixed in v2.1.0. Setting the `baseDir` option can also work around this vulnerability.",5.3,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N,N/A CVE-2024-0317,"Cross-Site Scripting in FireEye EX, affecting version 9.0.3.936727. Exploitation of this vulnerability allows an attacker to send a specially crafted JavaScript payload via the 'type' and 's_f_name' parameters to an authenticated user to retrieve their session details.",5.4,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N,"Fireeye Ex 5500 Firmwarea 9.0.3.936727, Fireeye Ex 8500 Firmware 9.0.3.936727, Fireeye Ex 3500 Firmware 9.0.3.936727" CVE-2024-0318,Cross-Site Scripting in FireEye HXTool affecting version 4.6. This vulnerability allows an attacker to store a specially crafted JavaScript payload in the 'Profile Name' and 'Hostname/IP' parameters that will be triggered when items are loaded.,5.4,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N,N/A CVE-2024-0319,"Open Redirect vulnerability in FireEye HXTool affecting version 4.6, the exploitation of which could allow an attacker to redirect a legitimate user to a malicious page by changing the 'redirect_uri' parameter.",5.4,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N,N/A CVE-2024-0320,Cross-Site Scripting in FireEye Malware Analysis (AX) affecting version 9.0.3.936530. This vulnerability allows an attacker to send a specially crafted JavaScript payload in the application URL to retrieve the session details of a legitimate user.,5.4,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N,N/A CVE-2024-0557,"A vulnerability, which was classified as problematic, was found in DedeBIZ 6.3.0. This affects an unknown part of the component Website Copyright Setting. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-250725 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.",2.4,CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N,N/A CVE-2024-0558,A vulnerability has been found in DedeBIZ 6.3.0 and classified as critical. This vulnerability affects unknown code of the file /admin/makehtml_freelist_action.php. The manipulation of the argument startid leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-250726 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.,4.7,CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L,N/A CVE-2024-0562,"A use-after-free flaw was found in the Linux Kernel. When a disk is removed, bdi_unregister is called to stop further write-back and waits for associated delayed work to complete. However, wb_inode_writeback_end() may schedule bandwidth estimation work after this has completed, which can result in the timer attempting to access the recently freed bdi_writeback.",7.8,CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,"Redhat Enterprise Linux 9.0, Redhat Enterprise Linux 8.0, Linux Linux Kernel, Linux Linux Kernel 6.0" CVE-2024-0565,"An out-of-bounds memory read flaw was found in receive_encrypted_standard in fs/smb/client/smb2ops.c in the SMB Client sub-component in the Linux Kernel. This issue occurs due to integer underflow on the memcpy length, leading to a denial of service.",6.8,CVSS:3.1/AV:A/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H,"Linux Linux Kernel, Linux Linux Kernel 6.7" CVE-2023-7206," In Horner Automation Cscape versions 9.90 SP10 and prior, local attackers are able to exploit this vulnerability if a user opens a malicious CSP file, which would result in execution of arbitrary code on affected installations of Cscape. ",7.8,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,N/A