Total
5238 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2024-54112 | 1 Huawei | 1 Harmonyos | 2024-12-12 | N/A | 5.5 MEDIUM |
Cross-process screen stack vulnerability in the UIExtension module Impact: Successful exploitation of this vulnerability may affect service confidentiality. | |||||
CVE-2024-54104 | 1 Huawei | 1 Harmonyos | 2024-12-12 | N/A | 6.2 MEDIUM |
Cross-process screen stack vulnerability in the UIExtension module Impact: Successful exploitation of this vulnerability may affect service confidentiality. | |||||
CVE-2024-32996 | 1 Huawei | 2 Emui, Harmonyos | 2024-12-09 | N/A | 6.2 MEDIUM |
Privilege escalation vulnerability in the account module Impact: Successful exploitation of this vulnerability will affect availability. | |||||
CVE-2023-52721 | 1 Huawei | 1 Harmonyos | 2024-12-09 | N/A | 6.2 MEDIUM |
The WindowManager module has a vulnerability in permission control. Impact: Successful exploitation of this vulnerability may affect confidentiality. | |||||
CVE-2017-9711 | 1 Qualcomm | 46 Mdm9206, Mdm9206 Firmware, Mdm9607 and 43 more | 2024-11-25 | N/A | 6.7 MEDIUM |
Certain unprivileged processes are able to perform IOCTL calls. | |||||
CVE-2024-5465 | 1 Huawei | 2 Emui, Harmonyos | 2024-11-21 | N/A | 5.9 MEDIUM |
Function vulnerabilities in the Calendar module Impact: Successful exploitation of this vulnerability will affect availability. | |||||
CVE-2024-39670 | 1 Huawei | 2 Emui, Harmonyos | 2024-11-21 | N/A | 6.2 MEDIUM |
Privilege escalation vulnerability in the account synchronisation module. Impact: Successful exploitation of this vulnerability will affect availability. | |||||
CVE-2024-21469 | 1 Qualcomm | 448 9205 Lte Modem, 9205 Lte Modem Firmware, Aqt1000 and 445 more | 2024-11-21 | N/A | 7.3 HIGH |
Memory corruption when an invoke call and a TEE call are bound for the same trusted application. | |||||
CVE-2024-20361 | 2024-11-21 | N/A | 5.8 MEDIUM | ||
A vulnerability in the Object Groups for Access Control Lists (ACLs) feature of Cisco Firepower Management Center (FMC) Software could allow an unauthenticated, remote attacker to bypass configured access controls on managed devices that are running Cisco Firepower Threat Defense (FTD) Software. This vulnerability is due to the incorrect deployment of the Object Groups for ACLs feature from Cisco FMC Software to managed FTD devices in high-availability setups. After an affected device is rebooted following Object Groups for ACLs deployment, an attacker can exploit this vulnerability by sending traffic through the affected device. A successful exploit could allow the attacker to bypass configured access controls and successfully send traffic to devices that are expected to be protected by the affected device. | |||||
CVE-2023-52106 | 1 Huawei | 1 Harmonyos | 2024-11-21 | N/A | 4.4 MEDIUM |
Vulnerability of permission verification for APIs in the DownloadProviderMain module. Impact: Successful exploitation of this vulnerability will affect integrity and availability. | |||||
CVE-2023-42005 | 2024-11-21 | N/A | 7.4 HIGH | ||
IBM Db2 on Cloud Pak for Data and Db2 Warehouse on Cloud Pak for Data 3.5, 4.0, 4.5, 4.6, 4.7, and 4.8 could allow a user with access to the Kubernetes pod, to make system calls compromising the security of containers. IBM X-Force ID: 265264. | |||||
CVE-2023-3599 | 1 Best Fee Management System Project | 1 Best Fee Management System | 2024-11-21 | 6.5 MEDIUM | 6.3 MEDIUM |
A vulnerability was found in SourceCodester Best Fee Management System 1.0. It has been rated as critical. Affected by this issue is the function save_user of the file admin_class.php of the component Add User Handler. The manipulation leads to improper access controls. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-233450 is the identifier assigned to this vulnerability. | |||||
CVE-2023-39380 | 1 Huawei | 2 Emui, Harmonyos | 2024-11-21 | N/A | 7.5 HIGH |
Permission control vulnerability in the audio module. Successful exploitation of this vulnerability may cause audio devices to perform abnormally. | |||||
CVE-2022-34149 | 1 Miniorange | 1 Wp Oauth Server | 2024-11-21 | N/A | 9.8 CRITICAL |
Authentication Bypass vulnerability in miniOrange WP OAuth Server plugin <= 3.0.4 at WordPress. | |||||
CVE-2022-29444 | 1 Cloudways | 1 Breeze | 2024-11-21 | 3.5 LOW | 6.5 MEDIUM |
Plugin Settings Change leading to Cross-Site Scripting (XSS) vulnerability in Cloudways Breeze plugin <= 2.0.2 on WordPress allows users with a subscriber or higher user role to execute any of the wp_ajax_* actions in the class Breeze_Configuration which includes the ability to change any of the plugin's settings including CDN setting which could be further used for XSS attack. | |||||
CVE-2019-9768 | 1 Thinkst | 1 Canarytokens | 2024-11-21 | 5.0 MEDIUM | 7.5 HIGH |
Thinkst Canarytokens through commit hash 4e89ee0 (2019-03-01) relies on limited variation in size, metadata, and timestamp, which makes it easier for attackers to estimate whether a Word document contains a token. | |||||
CVE-2019-9637 | 5 Canonical, Debian, Netapp and 2 more | 5 Ubuntu Linux, Debian Linux, Storage Automation Store and 2 more | 2024-11-21 | 5.0 MEDIUM | 7.5 HIGH |
An issue was discovered in PHP before 7.1.27, 7.2.x before 7.2.16, and 7.3.x before 7.3.3. Due to the way rename() across filesystems is implemented, it is possible that file being renamed is briefly available with wrong permissions while the rename is ongoing, thus enabling unauthorized users to access the data. | |||||
CVE-2019-3779 | 1 Cloudfoundry | 1 Container Runtime | 2024-11-21 | 4.0 MEDIUM | 8.8 HIGH |
Cloud Foundry Container Runtime, versions prior to 0.29.0, deploys Kubernetes clusters utilize the same CA (Certificate Authority) to sign and trust certs for ETCD as used by the Kubernetes API. This could allow a user authenticated with a cluster to request a signed certificate leveraging the Kubernetes CSR capability to obtain a credential that could escalate privilege access to ETCD. | |||||
CVE-2019-2122 | 1 Google | 1 Android | 2024-11-21 | 6.9 MEDIUM | 7.3 HIGH |
In LockTaskController.lockKeyguardIfNeeded of the LockTaskController.java, there was a difference in the handling of the default case between the WindowManager and the Settings. This could lead to a local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android. Versions: Android-7.0 Android-7.1.1 Android-7.1.2 Android-8.0 Android-8.1 Android-9. Android ID: A-127605586. | |||||
CVE-2019-2102 | 1 Google | 1 Android | 2024-11-21 | 8.3 HIGH | 8.8 HIGH |
In the Bluetooth Low Energy (BLE) specification, there is a provided example Long Term Key (LTK). If a BLE device were to use this as a hardcoded LTK, it is theoretically possible for a proximate attacker to remotely inject keystrokes on a paired Android host due to improperly used crypto. User interaction is not needed for exploitation. Product: Android. Versions: Android-7.0 Android-7.1.1 Android-7.1.2 Android-8.0 Android-8.1 Android-9. Android ID: A-128843052. |