Total
10067 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2019-20357 | 2 Microsoft, Trendmicro | 9 Windows, Antivirus \+ Security 2019, Antivirus \+ Security 2020 and 6 more | 2024-02-04 | 7.2 HIGH | 7.8 HIGH |
A Persistent Arbitrary Code Execution vulnerability exists in the Trend Micro Security 2020 (v160 and 2019 (v15) consumer familiy of products which could potentially allow an attacker the ability to create a malicious program to escalate privileges and attain persistence on a vulnerable system. | |||||
CVE-2019-4394 | 1 Ibm | 1 Cloud Orchestrator | 2024-02-04 | 2.1 LOW | 2.3 LOW |
IBM Cloud Orchestrator 2.4 through 2.4.0.5 and 2.5 through 2.5.0.9 contain APIs that could be used by a local user to send email. IBM X-Force ID: 162232. | |||||
CVE-2019-18824 | 1 Barco | 2 Clickshare Button R9861500d01, Clickshare Button R9861500d01 Firmware | 2024-02-04 | 6.9 MEDIUM | 6.6 MEDIUM |
Barco ClickShare Button R9861500D01 devices before 1.10.0.13 have Missing Support for Integrity Check. The ClickShare Button does not verify the integrity of the mutable content on the UBIFS partition before being used. | |||||
CVE-2011-4902 | 1 Typo3 | 1 Typo3 | 2024-02-04 | 5.5 MEDIUM | 6.5 MEDIUM |
TYPO3 before 4.3.12, 4.4.x before 4.4.9, and 4.5.x before 4.5.4 allows remote attackers to delete arbitrary files on the webserver. | |||||
CVE-2019-12653 | 1 Cisco | 6 Asr 902, Asr 902u, Asr 903 and 3 more | 2024-02-04 | 7.8 HIGH | 7.5 HIGH |
A vulnerability in the Raw Socket Transport feature of Cisco IOS XE Software could allow an unauthenticated, remote attacker to trigger a reload of an affected device, resulting in a denial of service (DoS) condition. The vulnerability is due to improper parsing of Raw Socket Transport payloads. An attacker could exploit this vulnerability by establishing a TCP session and then sending a malicious TCP segment via IPv4 to an affected device. This cannot be exploited via IPv6, as the Raw Socket Transport feature does not support IPv6 as a network layer protocol. | |||||
CVE-2012-4030 | 1 Chamilo | 1 Chamilo Lms | 2024-02-04 | 6.4 MEDIUM | 7.5 HIGH |
Chamilo before 1.8.8.6 does not adequately handle user supplied input by the index.php script, which could allow remote attackers to delete arbitrary files. | |||||
CVE-2010-3667 | 1 Typo3 | 1 Typo3 | 2024-02-04 | 5.0 MEDIUM | 5.3 MEDIUM |
TYPO3 before 4.1.14, 4.2.x before 4.2.13, 4.3.x before 4.3.4 and 4.4.x before 4.4.1 allows Spam Abuse in the native form content element. | |||||
CVE-2010-2446 | 1 Ruby-rbot | 1 Rbot | 2024-02-04 | 7.5 HIGH | 9.8 CRITICAL |
Rbot Reaction plugin allows command execution | |||||
CVE-2015-2784 | 1 Papercrop Project | 1 Papercrop | 2024-02-04 | 7.5 HIGH | 9.8 CRITICAL |
The papercrop gem before 0.3.0 for Ruby on Rails does not properly handle crop input. | |||||
CVE-2012-5582 | 1 Opendnssec | 1 Opendnssec | 2024-02-04 | 7.5 HIGH | 9.8 CRITICAL |
opendnssec misuses libcurl API | |||||
CVE-2019-12706 | 1 Cisco | 1 Email Security Appliance Firmware | 2024-02-04 | 5.0 MEDIUM | 7.5 HIGH |
A vulnerability in the Sender Policy Framework (SPF) functionality of Cisco AsyncOS Software for Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to bypass the configured user filters on an affected device. The vulnerability exists because the affected software insufficiently validates certain incoming SPF messages. An attacker could exploit this vulnerability by sending a custom SPF packet to an affected device. A successful exploit could allow the attacker to bypass the configured header filters, which could allow malicious content to pass through the device. | |||||
CVE-2019-19249 | 1 Querytreeapp | 1 Querytree | 2024-02-04 | 7.5 HIGH | 9.8 CRITICAL |
Controllers/InvitationsController.cs in QueryTree before 3.0.99-beta mishandles invitations. | |||||
CVE-2019-17408 | 1 Zzzcms | 1 Zzzphp | 2024-02-04 | 7.5 HIGH | 9.8 CRITICAL |
parserIfLabel in inc/zzz_template.php in ZZZCMS zzzphp 1.7.3 allows remote attackers to execute arbitrary code because the danger_key function can be bypassed via manipulations such as strtr. | |||||
CVE-2015-4410 | 2 Fedoraproject, Moped Project | 2 Fedora, Moped | 2024-02-04 | 5.0 MEDIUM | 7.5 HIGH |
The Moped::BSON::ObjecId.legal? method in rubygem-moped before commit dd5a7c14b5d2e466f7875d079af71ad19774609b allows remote attackers to cause a denial of service (worker resource consumption) or perform a cross-site scripting (XSS) attack via a crafted string. | |||||
CVE-2014-8126 | 1 Wisc | 1 Htcondor | 2024-02-04 | 6.5 MEDIUM | 8.8 HIGH |
The scheduler in HTCondor before 8.2.6 allows remote authenticated users to execute arbitrary code. | |||||
CVE-2019-11086 | 1 Intel | 1 Active Management Technology Firmware | 2024-02-04 | 4.6 MEDIUM | 6.8 MEDIUM |
Insufficient input validation in subsystem for Intel(R) AMT before version 12.0.45 may allow an unauthenticated user to potentially enable escalation of privilege via physical access. | |||||
CVE-2019-0168 | 1 Intel | 2 Converged Security Management Engine Firmware, Trusted Execution Engine Firmware | 2024-02-04 | 2.1 LOW | 4.4 MEDIUM |
Insufficient input validation in the subsystem for Intel(R) CSME before versions 11.8.70, 12.0.45 and 13.0.10; Intel(R) TXE before versions 3.1.70 and 4.0.20 may allow a privileged user to potentially enable information disclosure via local access. | |||||
CVE-2019-14566 | 3 Intel, Linux, Microsoft | 3 Software Guard Extensions Sdk, Linux Kernel, Windows | 2024-02-04 | 4.6 MEDIUM | 7.8 HIGH |
Insufficient input validation in Intel(R) SGX SDK multiple Linux and Windows versions may allow an authenticated user to enable information disclosure, escalation of privilege or denial of service via local access. | |||||
CVE-2019-16699 | 1 Sr Freecap Project | 1 Sr Freecap | 2024-02-04 | 7.5 HIGH | 9.8 CRITICAL |
The sr_freecap (aka freeCap CAPTCHA) extension 2.4.5 and below and 2.5.2 and below for TYPO3 fails to sanitize user input, which allows execution of arbitrary Extbase actions, resulting in Remote Code Execution. | |||||
CVE-2019-0719 | 1 Microsoft | 7 Windows 10, Windows 7, Windows 8.1 and 4 more | 2024-02-04 | 9.0 HIGH | 9.1 CRITICAL |
A remote code execution vulnerability exists when Windows Hyper-V Network Switch on a host server fails to properly validate input from an authenticated user on a guest operating system, aka 'Hyper-V Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2019-0721. |