Vulnerabilities (CVE)

Filtered by CWE-264
Total 5238 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2024-54112 1 Huawei 1 Harmonyos 2024-12-12 N/A 5.5 MEDIUM
Cross-process screen stack vulnerability in the UIExtension module Impact: Successful exploitation of this vulnerability may affect service confidentiality.
CVE-2024-54104 1 Huawei 1 Harmonyos 2024-12-12 N/A 6.2 MEDIUM
Cross-process screen stack vulnerability in the UIExtension module Impact: Successful exploitation of this vulnerability may affect service confidentiality.
CVE-2024-32996 1 Huawei 2 Emui, Harmonyos 2024-12-09 N/A 6.2 MEDIUM
Privilege escalation vulnerability in the account module Impact: Successful exploitation of this vulnerability will affect availability.
CVE-2023-52721 1 Huawei 1 Harmonyos 2024-12-09 N/A 6.2 MEDIUM
The WindowManager module has a vulnerability in permission control. Impact: Successful exploitation of this vulnerability may affect confidentiality.
CVE-2017-9711 1 Qualcomm 46 Mdm9206, Mdm9206 Firmware, Mdm9607 and 43 more 2024-11-25 N/A 6.7 MEDIUM
Certain unprivileged processes are able to perform IOCTL calls.
CVE-2024-5465 1 Huawei 2 Emui, Harmonyos 2024-11-21 N/A 5.9 MEDIUM
Function vulnerabilities in the Calendar module Impact: Successful exploitation of this vulnerability will affect availability.
CVE-2024-39670 1 Huawei 2 Emui, Harmonyos 2024-11-21 N/A 6.2 MEDIUM
Privilege escalation vulnerability in the account synchronisation module. Impact: Successful exploitation of this vulnerability will affect availability.
CVE-2024-21469 1 Qualcomm 448 9205 Lte Modem, 9205 Lte Modem Firmware, Aqt1000 and 445 more 2024-11-21 N/A 7.3 HIGH
Memory corruption when an invoke call and a TEE call are bound for the same trusted application.
CVE-2024-20361 2024-11-21 N/A 5.8 MEDIUM
A vulnerability in the Object Groups for Access Control Lists (ACLs) feature of Cisco Firepower Management Center (FMC) Software could allow an unauthenticated, remote attacker to bypass configured access controls on managed devices that are running Cisco Firepower Threat Defense (FTD) Software. This vulnerability is due to the incorrect deployment of the Object Groups for ACLs feature from Cisco FMC Software to managed FTD devices in high-availability setups. After an affected device is rebooted following Object Groups for ACLs deployment, an attacker can exploit this vulnerability by sending traffic through the affected device. A successful exploit could allow the attacker to bypass configured access controls and successfully send traffic to devices that are expected to be protected by the affected device.
CVE-2023-52106 1 Huawei 1 Harmonyos 2024-11-21 N/A 4.4 MEDIUM
Vulnerability of permission verification for APIs in the DownloadProviderMain module. Impact: Successful exploitation of this vulnerability will affect integrity and availability.
CVE-2023-42005 2024-11-21 N/A 7.4 HIGH
IBM Db2 on Cloud Pak for Data and Db2 Warehouse on Cloud Pak for Data 3.5, 4.0, 4.5, 4.6, 4.7, and 4.8 could allow a user with access to the Kubernetes pod, to make system calls compromising the security of containers. IBM X-Force ID: 265264.
CVE-2023-3599 1 Best Fee Management System Project 1 Best Fee Management System 2024-11-21 6.5 MEDIUM 6.3 MEDIUM
A vulnerability was found in SourceCodester Best Fee Management System 1.0. It has been rated as critical. Affected by this issue is the function save_user of the file admin_class.php of the component Add User Handler. The manipulation leads to improper access controls. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-233450 is the identifier assigned to this vulnerability.
CVE-2023-39380 1 Huawei 2 Emui, Harmonyos 2024-11-21 N/A 7.5 HIGH
Permission control vulnerability in the audio module. Successful exploitation of this vulnerability may cause audio devices to perform abnormally.
CVE-2022-34149 1 Miniorange 1 Wp Oauth Server 2024-11-21 N/A 9.8 CRITICAL
Authentication Bypass vulnerability in miniOrange WP OAuth Server plugin <= 3.0.4 at WordPress.
CVE-2022-29444 1 Cloudways 1 Breeze 2024-11-21 3.5 LOW 6.5 MEDIUM
Plugin Settings Change leading to Cross-Site Scripting (XSS) vulnerability in Cloudways Breeze plugin <= 2.0.2 on WordPress allows users with a subscriber or higher user role to execute any of the wp_ajax_* actions in the class Breeze_Configuration which includes the ability to change any of the plugin's settings including CDN setting which could be further used for XSS attack.
CVE-2019-9768 1 Thinkst 1 Canarytokens 2024-11-21 5.0 MEDIUM 7.5 HIGH
Thinkst Canarytokens through commit hash 4e89ee0 (2019-03-01) relies on limited variation in size, metadata, and timestamp, which makes it easier for attackers to estimate whether a Word document contains a token.
CVE-2019-9637 5 Canonical, Debian, Netapp and 2 more 5 Ubuntu Linux, Debian Linux, Storage Automation Store and 2 more 2024-11-21 5.0 MEDIUM 7.5 HIGH
An issue was discovered in PHP before 7.1.27, 7.2.x before 7.2.16, and 7.3.x before 7.3.3. Due to the way rename() across filesystems is implemented, it is possible that file being renamed is briefly available with wrong permissions while the rename is ongoing, thus enabling unauthorized users to access the data.
CVE-2019-3779 1 Cloudfoundry 1 Container Runtime 2024-11-21 4.0 MEDIUM 8.8 HIGH
Cloud Foundry Container Runtime, versions prior to 0.29.0, deploys Kubernetes clusters utilize the same CA (Certificate Authority) to sign and trust certs for ETCD as used by the Kubernetes API. This could allow a user authenticated with a cluster to request a signed certificate leveraging the Kubernetes CSR capability to obtain a credential that could escalate privilege access to ETCD.
CVE-2019-2122 1 Google 1 Android 2024-11-21 6.9 MEDIUM 7.3 HIGH
In LockTaskController.lockKeyguardIfNeeded of the LockTaskController.java, there was a difference in the handling of the default case between the WindowManager and the Settings. This could lead to a local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android. Versions: Android-7.0 Android-7.1.1 Android-7.1.2 Android-8.0 Android-8.1 Android-9. Android ID: A-127605586.
CVE-2019-2102 1 Google 1 Android 2024-11-21 8.3 HIGH 8.8 HIGH
In the Bluetooth Low Energy (BLE) specification, there is a provided example Long Term Key (LTK). If a BLE device were to use this as a hardcoded LTK, it is theoretically possible for a proximate attacker to remotely inject keystrokes on a paired Android host due to improperly used crypto. User interaction is not needed for exploitation. Product: Android. Versions: Android-7.0 Android-7.1.1 Android-7.1.2 Android-8.0 Android-8.1 Android-9. Android ID: A-128843052.