Total
32539 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2022-24003 | 1 Samsung | 1 Bixby Vision | 2024-11-21 | 5.0 MEDIUM | 4.0 MEDIUM |
Exposure of Sensitive Information vulnerability in Bixby Vision prior to version 3.7.50.6 allows attackers to access internal data of Bixby Vision via unprotected intent. | |||||
CVE-2022-24001 | 1 Google | 1 Android | 2024-11-21 | 2.1 LOW | 3.8 LOW |
Information disclosure vulnerability in Edge Panel prior to Android S(12) allows physical attackers to access screenshot in clipboard via Edge Panel. | |||||
CVE-2022-24000 | 1 Google | 1 Android | 2024-11-21 | 2.1 LOW | 3.9 LOW |
PendingIntent hijacking vulnerability in DataUsageReminderReceiver prior to SMR Feb-2022 Release 1 allows local attackers to access media files without permission in KnoxPrivacyNoticeReceiver via implicit Intent. | |||||
CVE-2022-23999 | 1 Google | 1 Android | 2024-11-21 | 2.1 LOW | 3.9 LOW |
PendingIntent hijacking vulnerability in CpaReceiver prior to SMR Feb-2022 Release 1 allows local attackers to access media files without permission in KnoxPrivacyNoticeReceiver via implicit Intent. | |||||
CVE-2022-23989 | 1 Stormshield | 1 Stormshield Network Security | 2024-11-21 | 5.0 MEDIUM | 7.5 HIGH |
In Stormshield Network Security (SNS) before 3.7.25, 3.8.x through 3.11.x before 3.11.13, 4.x before 4.2.10, and 4.3.x before 4.3.5, a flood of connections to the SSLVPN service might lead to saturation of the loopback interface. This could result in the blocking of almost all network traffic, making the firewall unreachable. An attacker could exploit this via forged and properly timed traffic to cause a denial of service. | |||||
CVE-2022-23981 | 1 Quadlayers | 1 Perfect Brands For Woocommerce | 2024-11-21 | 4.0 MEDIUM | 4.3 MEDIUM |
The vulnerability allows Subscriber+ level users to create brands in WordPress Perfect Brands for WooCommerce plugin (versions <= 2.0.4). | |||||
CVE-2022-23960 | 3 Arm, Debian, Xen | 42 Cortex-a57, Cortex-a57 Firmware, Cortex-a65 and 39 more | 2024-11-21 | 1.9 LOW | 5.6 MEDIUM |
Certain Arm Cortex and Neoverse processors through 2022-03-08 do not properly restrict cache speculation, aka Spectre-BHB. An attacker can leverage the shared branch history in the Branch History Buffer (BHB) to influence mispredicted branches. Then, cache allocation can allow the attacker to obtain sensitive information. | |||||
CVE-2022-23958 | 1 Hp | 4 Probook 440 G8, Probook 440 G8 Firmware, Prodesk 405 G6 Small Form Factor and 1 more | 2024-11-21 | 2.1 LOW | 5.5 MEDIUM |
Potential vulnerabilities have been identified in the BIOS for some HP PC products which may allow denial of service. | |||||
CVE-2022-23957 | 1 Hp | 4 Probook 440 G8, Probook 440 G8 Firmware, Prodesk 405 G6 Small Form Factor and 1 more | 2024-11-21 | 2.1 LOW | 5.5 MEDIUM |
Potential vulnerabilities have been identified in the BIOS for some HP PC products which may allow denial of service. | |||||
CVE-2022-23956 | 1 Hp | 4 Probook 440 G8, Probook 440 G8 Firmware, Prodesk 405 G6 Small Form Factor and 1 more | 2024-11-21 | 4.9 MEDIUM | 5.5 MEDIUM |
Potential vulnerabilities have been identified in the BIOS for some HP PC products which may allow denial of service. | |||||
CVE-2022-23955 | 1 Hp | 4 Probook 440 G8, Probook 440 G8 Firmware, Prodesk 405 G6 Small Form Factor and 1 more | 2024-11-21 | 2.1 LOW | 5.5 MEDIUM |
Potential vulnerabilities have been identified in the BIOS for some HP PC products which may allow denial of service. | |||||
CVE-2022-23954 | 1 Hp | 4 Probook 440 G8, Probook 440 G8 Firmware, Prodesk 405 G6 Small Form Factor and 1 more | 2024-11-21 | 2.1 LOW | 5.5 MEDIUM |
Potential vulnerabilities have been identified in the BIOS for some HP PC products which may allow denial of service. | |||||
CVE-2022-23953 | 1 Hp | 4 Probook 440 G8, Probook 440 G8 Firmware, Prodesk 405 G6 Small Form Factor and 1 more | 2024-11-21 | 4.9 MEDIUM | 5.5 MEDIUM |
Potential vulnerabilities have been identified in the BIOS for some HP PC products which may allow denial of service. | |||||
CVE-2022-23934 | 1 Hp | 1 Pc Bios | 2024-11-21 | 7.2 HIGH | 8.2 HIGH |
Potential vulnerabilities have been identified in the system BIOS of certain HP PC products which may allow Escalation of Privilege, Arbitrary Code Execution, Unauthorized Code Execution, Denial of Service, and Information Disclosure. | |||||
CVE-2022-23933 | 1 Hp | 1 Pc Bios | 2024-11-21 | 7.2 HIGH | 8.2 HIGH |
Potential vulnerabilities have been identified in the system BIOS of certain HP PC products which may allow Escalation of Privilege, Arbitrary Code Execution, Unauthorized Code Execution, Denial of Service, and Information Disclosure. | |||||
CVE-2022-23932 | 1 Hp | 1 Pc Bios | 2024-11-21 | 7.2 HIGH | 8.2 HIGH |
Potential vulnerabilities have been identified in the system BIOS of certain HP PC products which may allow Escalation of Privilege, Arbitrary Code Execution, Unauthorized Code Execution, Denial of Service, and Information Disclosure. | |||||
CVE-2022-23931 | 1 Hp | 1 Pc Bios | 2024-11-21 | 7.2 HIGH | 8.2 HIGH |
Potential vulnerabilities have been identified in the system BIOS of certain HP PC products which may allow Escalation of Privilege, Arbitrary Code Execution, Unauthorized Code Execution, Denial of Service, and Information Disclosure. | |||||
CVE-2022-23930 | 1 Hp | 1 Pc Bios | 2024-11-21 | 7.2 HIGH | 8.2 HIGH |
Potential vulnerabilities have been identified in the system BIOS of certain HP PC products which may allow Escalation of Privilege, Arbitrary Code Execution, Unauthorized Code Execution, Denial of Service, and Information Disclosure. | |||||
CVE-2022-23929 | 1 Hp | 1 Pc Bios | 2024-11-21 | 7.2 HIGH | 8.2 HIGH |
Potential vulnerabilities have been identified in the system BIOS of certain HP PC products which may allow Escalation of Privilege, Arbitrary Code Execution, Unauthorized Code Execution, Denial of Service, and Information Disclosure. | |||||
CVE-2022-23928 | 1 Hp | 1 Pc Bios | 2024-11-21 | 7.2 HIGH | 8.2 HIGH |
Potential vulnerabilities have been identified in the system BIOS of certain HP PC products which may allow Escalation of Privilege, Arbitrary Code Execution, Unauthorized Code Execution, Denial of Service, and Information Disclosure. |