Vulnerabilities (CVE)

Filtered by CWE-668
Total 638 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2023-38152 1 Microsoft 5 Windows Server 2008, Windows Server 2012, Windows Server 2016 and 2 more 2024-05-29 N/A 5.3 MEDIUM
DHCP Server Service Information Disclosure Vulnerability
CVE-2023-21714 1 Microsoft 2 365 Apps, Office Long Term Servicing Channel 2024-05-29 N/A 5.5 MEDIUM
Microsoft Office Information Disclosure Vulnerability
CVE-2023-21687 1 Microsoft 3 Windows 11 21h2, Windows 11 22h2, Windows Server 2022 2024-05-29 N/A 5.5 MEDIUM
HTTP.sys Information Disclosure Vulnerability
CVE-2023-21536 1 Microsoft 8 Windows 10 1809, Windows 10 20h2, Windows 10 21h2 and 5 more 2024-05-29 N/A 4.7 MEDIUM
Event Tracing for Windows Information Disclosure Vulnerability
CVE-2023-36596 1 Microsoft 10 Windows 10 1507, Windows 10 1809, Windows 10 21h1 and 7 more 2024-05-29 N/A 7.5 HIGH
Remote Procedure Call Information Disclosure Vulnerability
CVE-2023-36429 1 Microsoft 1 Dynamics 365 2024-05-29 N/A 6.5 MEDIUM
Microsoft Dynamics 365 (On-Premises) Information Disclosure Vulnerability
CVE-2023-36043 1 Microsoft 1 System Center Operations Manager 2024-05-29 N/A 6.5 MEDIUM
Open Management Infrastructure Information Disclosure Vulnerability
CVE-2023-36013 1 Microsoft 1 Powershell 2024-05-29 N/A 6.5 MEDIUM
PowerShell Information Disclosure Vulnerability
CVE-2023-32016 1 Microsoft 12 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 9 more 2024-05-29 N/A 5.5 MEDIUM
Windows Installer Information Disclosure Vulnerability
CVE-2024-20694 1 Microsoft 11 Windows 10 1607, Windows 10 1809, Windows 10 21h2 and 8 more 2024-05-29 N/A 5.5 MEDIUM
Windows CoreMessaging Information Disclosure Vulnerability
CVE-2024-20692 1 Microsoft 14 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 11 more 2024-05-29 N/A 5.7 MEDIUM
Microsoft Local Security Authority Subsystem Service Information Disclosure Vulnerability
CVE-2024-3019 2024-05-28 N/A 8.8 HIGH
A flaw was found in PCP. The default pmproxy configuration exposes the Redis server backend to the local network, allowing remote command execution with the privileges of the Redis user. This issue can only be exploited when pmproxy is running. By default, pmproxy is not running and needs to be started manually. The pmproxy service is usually started from the 'Metrics settings' page of the Cockpit web interface. This flaw affects PCP versions 4.3.4 and newer.
CVE-2024-0443 3 Fedoraproject, Linux, Redhat 3 Fedora, Linux Kernel, Enterprise Linux 2024-05-20 N/A 5.5 MEDIUM
A flaw was found in the blkgs destruction path in block/blk-cgroup.c in the Linux kernel, leading to a cgroup blkio memory leakage problem. When a cgroup is being destroyed, cgroup_rstat_flush() is only called at css_release_work_fn(), which is called when the blkcg reference count reaches 0. This circular dependency will prevent blkcg and some blkgs from being freed after they are made offline. This issue may allow an attacker with a local access to cause system instability, such as an out of memory error.
CVE-2023-29820 1 Webroot 1 Secureanywhere 2024-05-17 N/A 5.5 MEDIUM
An issue found in Webroot SecureAnywhere Endpoint Protection CE 23.1 v.9.0.33.39 and before allows a local attacker to access sensitive information via the EXE installer. NOTE: the vendor's perspective is that this is not a separate vulnerability relative to CVE-2023-29818 and CVE-2023-29819.
CVE-2022-4903 1 Codenameone 1 Codename One 2024-05-17 5.1 MEDIUM 8.1 HIGH
A vulnerability was found in CodenameOne 7.0.70. It has been classified as problematic. Affected is an unknown function. The manipulation leads to use of implicit intent for sensitive communication. It is possible to launch the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. Upgrading to version 7.0.71 is able to address this issue. The patch is identified as dad49c9ef26a598619fc48d2697151a02987d478. It is recommended to upgrade the affected component. VDB-220470 is the identifier assigned to this vulnerability.
CVE-2022-4817 1 Jgit-cookbook Project 1 Jgit-cookbook 2024-05-17 N/A 7.8 HIGH
A vulnerability was found in centic9 jgit-cookbook. It has been declared as problematic. This vulnerability affects unknown code. The manipulation leads to insecure temporary file. The attack can be initiated remotely. The name of the patch is b8cb29b43dc704708d598c60ac1881db7cf8e9c3. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-216988.
CVE-2022-27772 1 Vmware 1 Spring Boot 2024-05-17 4.6 MEDIUM 7.8 HIGH
spring-boot versions prior to version v2.2.11.RELEASE was vulnerable to temporary directory hijacking. This vulnerability impacted the org.springframework.boot.web.server.AbstractConfigurableWebServerFactory.createTempDir method. NOTE: This vulnerability only affects products and/or versions that are no longer supported by the maintainer
CVE-2022-23835 1 Visual Voice Mail Project 1 Visual Voice Mail 2024-05-17 4.3 MEDIUM 8.1 HIGH
The Visual Voice Mail (VVM) application through 2022-02-24 for Android allows persistent access if an attacker temporarily controls an application that has the READ_SMS permission, and reads an IMAP credentialing message that is (by design) not displayed to the victim within the AOSP SMS/MMS messaging application. (Often, the IMAP credentials are usable to listen to voice mail messages sent before the vulnerability was exploited, in addition to new ones.) NOTE: some vendors characterize this as not a "concrete and exploitable risk.
CVE-2021-45420 1 Emerson 2 Dixell Xweb-500, Dixell Xweb-500 Firmware 2024-05-17 10.0 HIGH 9.8 CRITICAL
Emerson Dixell XWEB-500 products are affected by arbitrary file write vulnerability in /cgi-bin/logo_extra_upload.cgi, /cgi-bin/cal_save.cgi, and /cgi-bin/lo_utils.cgi. An attacker will be able to write any file on the target system without any kind of authentication mechanism, and this can lead to denial of service and potentially remote code execution. Note: the product has not been supported since 2018 and should be removed or replaced
CVE-2019-16387 1 Pega 1 Pega Platform 2024-05-17 5.5 MEDIUM 8.1 HIGH
PEGA Platform 8.3.0 is vulnerable to a direct prweb/sso/random_token/!STANDARD?pyActivity=Data-Admin-DB-Name.DBSchema_ListDatabases request while using a low-privilege account. (This can perform actions and retrieve data that only an administrator should have access to.) NOTE: The vendor states that this vulnerability was discovered using an administrator account and they are normal administrator functions. Therefore, the claim that the CVE was done with a low privilege account is incorrect