Search Results (44127 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2022-47336 2 Google, Unisoc 14 Android, S8000, Sc7731e and 11 more 2025-02-10 5.5 Medium
In telecom service, there is a missing permission check. This could lead to local denial of service in telecom service.
CVE-2022-47335 2 Google, Unisoc 14 Android, S8000, Sc7731e and 11 more 2025-02-10 5.5 Medium
In telecom service, there is a missing permission check. This could lead to local denial of service in telecom service.
CVE-2022-47464 2 Google, Unisoc 14 Android, S8000, Sc7731e and 11 more 2025-02-10 5.5 Medium
In telecom service, there is a missing permission check. This could lead to local denial of service in telecom service.
CVE-2022-47463 2 Google, Unisoc 14 Android, S8000, Sc7731e and 11 more 2025-02-10 5.5 Medium
In telecom service, there is a missing permission check. This could lead to local denial of service in telecom service.
CVE-2022-47362 2 Google, Unisoc 14 Android, S8000, Sc7731e and 11 more 2025-02-10 5.5 Medium
In telecom service, there is a missing permission check. This could lead to local denial of service in telecom service.
CVE-2023-22660 1 Justsystems 1 Ichitaro 2022 2025-02-10 7 High
A heap-based buffer overflow vulnerability exists in the way Ichitaro version 2022 1.0.1.57600 processes certain LayoutBox stream record types. A specially crafted document can cause a buffer overflow, leading to memory corruption, which can result in arbitrary code execution.To trigger this vulnerability, the victim would need to open a malicious, attacker-created document.
CVE-2023-1906 2 Fedoraproject, Imagemagick 3 Extra Packages For Enterprise Linux, Fedora, Imagemagick 2025-02-10 5.5 Medium
A heap-based buffer overflow issue was discovered in ImageMagick's ImportMultiSpectralQuantum() function in MagickCore/quantum-import.c. An attacker could pass specially crafted file to convert, triggering an out-of-bounds read error, allowing an application to crash, resulting in a denial of service.
CVE-2023-27704 1 Voidtools 1 Everything 2025-02-10 5.5 Medium
Void Tools Everything lower than v1.4.1.1022 was discovered to contain a Regular Expression Denial of Service (ReDoS).
CVE-2023-26121 1 Safe-eval Project 1 Safe-eval 2025-02-10 7.5 High
All versions of the package safe-eval are vulnerable to Prototype Pollution via the safeEval function, due to improper sanitization of its parameter content.
CVE-2024-39682 2 Boxystudio, Xjsv 2 Cooked, Cooked 2025-02-10 6.4 Medium
Cooked is a recipe plugin for WordPress. The Cooked plugin for WordPress is vulnerable to HTML Injection in versions up to, and including, 1.7.15.4 due to insufficient input sanitization and output escaping. This vulnerability allows authenticated attackers with contributor-level access and above to inject arbitrary HTML in pages that will be shown whenever a user accesses a compromised page. This issue has been addressed in release version 1.8.0. Users are advised to upgrade. There are no known workarounds for this vulnerability.
CVE-2023-29574 1 Axiosys 1 Bento4 2025-02-08 5.5 Medium
Bento4 v1.6.0-639 was discovered to contain an out-of-memory bug in the mp42avc component.
CVE-2023-29571 1 Cesanta 1 Mjs 2025-02-08 5.5 Medium
Cesanta MJS v2.20.0 was discovered to contain a SEGV vulnerability via gc_sweep at src/mjs_gc.c. This vulnerability can lead to a Denial of Service (DoS).
CVE-2023-46400 1 Kwhotel 1 Kwhotel 2025-02-07 4.3 Medium
KWHotel 0.47 is vulnerable to CSV Formula Injection in the add guest function.
CVE-2025-22475 1 Dell 1 Data Domain Operating System 2025-02-07 3.7 Low
Dell PowerProtect DD, versions prior to DDOS 8.3.0.0, 7.10.1.50, and 7.13.1.10 contains a use of a Cryptographic Primitive with a Risky Implementation vulnerability. A remote attacker could potentially exploit this vulnerability, leading to Information tampering.
CVE-2024-53295 1 Dell 1 Data Domain Operating System 2025-02-07 7.8 High
Dell PowerProtect DD versions prior to 8.3.0.0, 7.10.1.50, and 7.13.1.20 contain an improper access control vulnerability. A local malicious user with low privileges could potentially exploit this vulnerability leading to escalation of privilege.
CVE-2024-39556 1 Juniper 3 Junos, Junos Os, Junos Os Evolved 2025-02-07 6.4 Medium
A Stack-Based Buffer Overflow vulnerability in Juniper Networks Junos OS and Juniper Networks Junos OS Evolved may allow a local, low-privileged attacker with access to the CLI the ability to load a malicious certificate file, leading to a limited Denial of Service (DoS) or privileged code execution. By exploiting the 'set security certificates' command with a crafted certificate file, a malicious attacker with access to the CLI could cause a crash of the command management daemon (mgd), limited to the local user's command interpreter, or potentially trigger a stack-based buffer overflow. This issue affects:  Junos OS: * All versions before 21.4R3-S7, * from 22.1 before 22.1R3-S6, * from 22.2 before 22.2R3-S4, * from 22.3 before 22.3R3-S3, * from 22.4 before 22.4R3-S2, * from 23.2 before 23.2R2, * from 23.4 before 23.4R1-S1, 23.4R2;  Junos OS Evolved: * All versions before 21.4R3-S7-EVO, * from 22.1-EVO before 22.1R3-S6-EVO, * from 22.2-EVO before 22.2R3-S4-EVO, * from 22.3-EVO before 22.3R3-S3-EVO, * from 22.4-EVO before 22.4R3-S2-EVO, * from 23.2-EVO before 23.2R2-EVO, * from 23.4-EVO before 23.4R1-S1-EVO, 23.4R2-EVO.
CVE-2019-16120 1 Liquidweb 1 Event Tickets 2025-02-07 8.8 High
CSV injection in the event-tickets (Event Tickets) plugin before 4.10.7.2 for WordPress exists via the "All Post> Ticketed > Attendees" Export Attendees feature.
CVE-2024-39512 1 Juniper 2 Junos Evolved, Junos Os Evolved 2025-02-07 6.6 Medium
An Improper Physical Access Control vulnerability in the console port control of Juniper Networks Junos OS Evolved allows an attacker with physical access to the device to get access to a user account. When the console cable is disconnected, the logged in user is not logged out. This allows a malicious attacker with physical access to the console to resume a previous session and possibly gain administrative privileges. This issue affects Junos OS Evolved: * from 23.2R2-EVO before 23.2R2-S1-EVO,  * from 23.4R1-EVO before 23.4R2-EVO.
CVE-2024-2223 1 Bitdefender 2 Endpoint Security, Gravityzone Control Center 2025-02-07 8.1 High
An Incorrect Regular Expression vulnerability in Bitdefender GravityZone Update Server allows an attacker to cause a Server Side Request Forgery and reconfigure the relay. This issue affects the following products that include the vulnerable component:  Bitdefender Endpoint Security for Linux version 7.0.5.200089 Bitdefender Endpoint Security for  Windows version 7.9.9.380 GravityZone Control Center (On Premises) version 6.36.1
CVE-2023-30524 1 Jenkins 1 Report Portal 2025-02-07 4.3 Medium
Jenkins Report Portal Plugin 0.5 and earlier does not mask ReportPortal access tokens displayed on the configuration form, increasing the potential for attackers to observe and capture them.