Total
638 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2023-38152 | 1 Microsoft | 5 Windows Server 2008, Windows Server 2012, Windows Server 2016 and 2 more | 2024-05-29 | N/A | 5.3 MEDIUM |
DHCP Server Service Information Disclosure Vulnerability | |||||
CVE-2023-21714 | 1 Microsoft | 2 365 Apps, Office Long Term Servicing Channel | 2024-05-29 | N/A | 5.5 MEDIUM |
Microsoft Office Information Disclosure Vulnerability | |||||
CVE-2023-21687 | 1 Microsoft | 3 Windows 11 21h2, Windows 11 22h2, Windows Server 2022 | 2024-05-29 | N/A | 5.5 MEDIUM |
HTTP.sys Information Disclosure Vulnerability | |||||
CVE-2023-21536 | 1 Microsoft | 8 Windows 10 1809, Windows 10 20h2, Windows 10 21h2 and 5 more | 2024-05-29 | N/A | 4.7 MEDIUM |
Event Tracing for Windows Information Disclosure Vulnerability | |||||
CVE-2023-36596 | 1 Microsoft | 10 Windows 10 1507, Windows 10 1809, Windows 10 21h1 and 7 more | 2024-05-29 | N/A | 7.5 HIGH |
Remote Procedure Call Information Disclosure Vulnerability | |||||
CVE-2023-36429 | 1 Microsoft | 1 Dynamics 365 | 2024-05-29 | N/A | 6.5 MEDIUM |
Microsoft Dynamics 365 (On-Premises) Information Disclosure Vulnerability | |||||
CVE-2023-36043 | 1 Microsoft | 1 System Center Operations Manager | 2024-05-29 | N/A | 6.5 MEDIUM |
Open Management Infrastructure Information Disclosure Vulnerability | |||||
CVE-2023-36013 | 1 Microsoft | 1 Powershell | 2024-05-29 | N/A | 6.5 MEDIUM |
PowerShell Information Disclosure Vulnerability | |||||
CVE-2023-32016 | 1 Microsoft | 12 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 9 more | 2024-05-29 | N/A | 5.5 MEDIUM |
Windows Installer Information Disclosure Vulnerability | |||||
CVE-2024-20694 | 1 Microsoft | 11 Windows 10 1607, Windows 10 1809, Windows 10 21h2 and 8 more | 2024-05-29 | N/A | 5.5 MEDIUM |
Windows CoreMessaging Information Disclosure Vulnerability | |||||
CVE-2024-20692 | 1 Microsoft | 14 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 11 more | 2024-05-29 | N/A | 5.7 MEDIUM |
Microsoft Local Security Authority Subsystem Service Information Disclosure Vulnerability | |||||
CVE-2024-3019 | 2024-05-28 | N/A | 8.8 HIGH | ||
A flaw was found in PCP. The default pmproxy configuration exposes the Redis server backend to the local network, allowing remote command execution with the privileges of the Redis user. This issue can only be exploited when pmproxy is running. By default, pmproxy is not running and needs to be started manually. The pmproxy service is usually started from the 'Metrics settings' page of the Cockpit web interface. This flaw affects PCP versions 4.3.4 and newer. | |||||
CVE-2024-0443 | 3 Fedoraproject, Linux, Redhat | 3 Fedora, Linux Kernel, Enterprise Linux | 2024-05-20 | N/A | 5.5 MEDIUM |
A flaw was found in the blkgs destruction path in block/blk-cgroup.c in the Linux kernel, leading to a cgroup blkio memory leakage problem. When a cgroup is being destroyed, cgroup_rstat_flush() is only called at css_release_work_fn(), which is called when the blkcg reference count reaches 0. This circular dependency will prevent blkcg and some blkgs from being freed after they are made offline. This issue may allow an attacker with a local access to cause system instability, such as an out of memory error. | |||||
CVE-2023-29820 | 1 Webroot | 1 Secureanywhere | 2024-05-17 | N/A | 5.5 MEDIUM |
An issue found in Webroot SecureAnywhere Endpoint Protection CE 23.1 v.9.0.33.39 and before allows a local attacker to access sensitive information via the EXE installer. NOTE: the vendor's perspective is that this is not a separate vulnerability relative to CVE-2023-29818 and CVE-2023-29819. | |||||
CVE-2022-4903 | 1 Codenameone | 1 Codename One | 2024-05-17 | 5.1 MEDIUM | 8.1 HIGH |
A vulnerability was found in CodenameOne 7.0.70. It has been classified as problematic. Affected is an unknown function. The manipulation leads to use of implicit intent for sensitive communication. It is possible to launch the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. Upgrading to version 7.0.71 is able to address this issue. The patch is identified as dad49c9ef26a598619fc48d2697151a02987d478. It is recommended to upgrade the affected component. VDB-220470 is the identifier assigned to this vulnerability. | |||||
CVE-2022-4817 | 1 Jgit-cookbook Project | 1 Jgit-cookbook | 2024-05-17 | N/A | 7.8 HIGH |
A vulnerability was found in centic9 jgit-cookbook. It has been declared as problematic. This vulnerability affects unknown code. The manipulation leads to insecure temporary file. The attack can be initiated remotely. The name of the patch is b8cb29b43dc704708d598c60ac1881db7cf8e9c3. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-216988. | |||||
CVE-2022-27772 | 1 Vmware | 1 Spring Boot | 2024-05-17 | 4.6 MEDIUM | 7.8 HIGH |
spring-boot versions prior to version v2.2.11.RELEASE was vulnerable to temporary directory hijacking. This vulnerability impacted the org.springframework.boot.web.server.AbstractConfigurableWebServerFactory.createTempDir method. NOTE: This vulnerability only affects products and/or versions that are no longer supported by the maintainer | |||||
CVE-2022-23835 | 1 Visual Voice Mail Project | 1 Visual Voice Mail | 2024-05-17 | 4.3 MEDIUM | 8.1 HIGH |
The Visual Voice Mail (VVM) application through 2022-02-24 for Android allows persistent access if an attacker temporarily controls an application that has the READ_SMS permission, and reads an IMAP credentialing message that is (by design) not displayed to the victim within the AOSP SMS/MMS messaging application. (Often, the IMAP credentials are usable to listen to voice mail messages sent before the vulnerability was exploited, in addition to new ones.) NOTE: some vendors characterize this as not a "concrete and exploitable risk. | |||||
CVE-2021-45420 | 1 Emerson | 2 Dixell Xweb-500, Dixell Xweb-500 Firmware | 2024-05-17 | 10.0 HIGH | 9.8 CRITICAL |
Emerson Dixell XWEB-500 products are affected by arbitrary file write vulnerability in /cgi-bin/logo_extra_upload.cgi, /cgi-bin/cal_save.cgi, and /cgi-bin/lo_utils.cgi. An attacker will be able to write any file on the target system without any kind of authentication mechanism, and this can lead to denial of service and potentially remote code execution. Note: the product has not been supported since 2018 and should be removed or replaced | |||||
CVE-2019-16387 | 1 Pega | 1 Pega Platform | 2024-05-17 | 5.5 MEDIUM | 8.1 HIGH |
PEGA Platform 8.3.0 is vulnerable to a direct prweb/sso/random_token/!STANDARD?pyActivity=Data-Admin-DB-Name.DBSchema_ListDatabases request while using a low-privilege account. (This can perform actions and retrieve data that only an administrator should have access to.) NOTE: The vendor states that this vulnerability was discovered using an administrator account and they are normal administrator functions. Therefore, the claim that the CVE was done with a low privilege account is incorrect |