Search and browse vulnerability records from NVD
Showing 50 of 44867 CVEs
| CVE ID | Severity | Description | EPSS | Published | |
|---|---|---|---|---|---|
| 6.7 MEDIUM |
Dell PowerScale OneFS, 8.0.x-9.5.x, contains an improper handling of insufficient privileges vulnerability. A local privileged attacker could potentially exploit this vulnerability, leading to elevation of privilege and affect in compliance mode also. |
0.0% | 2023-08-16 | ||
| 5.4 MEDIUM |
The URL Params WordPress plugin before 2.5 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks. |
0.1% | 2023-08-16 | ||
| 9.8 CRITICAL |
Broadcom RAID Controller web interface is vulnerable to insufficient randomness due to improper use of ssl.rnd to setup CIM connection |
0.1% | 2023-08-15 | ||
| 7.5 HIGH |
Broadcom RAID Controller web interface is vulnerable due to exposure of sensitive password information in the URL as a URL search parameter |
0.1% | 2023-08-15 | ||
| 9.8 CRITICAL |
Broadcom RAID Controller web interface is vulnerable due to insecure defaults of lacking HTTP strict-transport-security policy |
0.1% | 2023-08-15 | ||
| 9.8 CRITICAL |
Broadcom RAID Controller is vulnerable to Privilege escalation to root due to creation of insecure folders by Web GUI |
0.1% | 2023-08-15 | ||
| 9.8 CRITICAL |
Broadcom RAID Controller is vulnerable to Privilege escalation by taking advantage of the Session prints in the log file |
0.1% | 2023-08-15 | ||
| 7.5 HIGH |
Broadcom RAID Controller web interface is vulnerable to exposure of private keys used for CIM stored with insecure file permissions |
0.1% | 2023-08-15 | ||
| 9.8 CRITICAL |
Broadcom RAID Controller web interface is vulnerable due to insecure default of HTTP configuration that does not provide X-Content-Type-Options Headers |
0.1% | 2023-08-15 | ||
| 9.8 CRITICAL |
Broadcom RAID Controller web interface is vulnerable to improper session handling of managed servers on Gateway installation |
0.1% | 2023-08-15 | ||
| 9.8 CRITICAL |
Broadcom RAID Controller web interface is vulnerable due to insecure default of HTTP configuration that does not safeguard cookies with Secure attribute |
0.1% | 2023-08-15 | ||
| 7.5 HIGH |
Broadcom RAID Controller Web server (nginx) is serving private files without any authentication |
0.1% | 2023-08-15 | ||
| 5.5 MEDIUM |
Broadcom RAID Controller web interface doesn’t enforce SSL cipher ordering by server |
0.0% | 2023-08-15 | ||
| 7.5 HIGH |
Broadcom RAID Controller web interface is vulnerable due to Improper permissions on the log file |
0.1% | 2023-08-15 | ||
| 7.5 HIGH |
Broadcom RAID Controller web interface is vulnerable has an insecure default TLS configuration that support obsolete and vulnerable TLS protocols |
0.0% | 2023-08-15 | ||
| 9.8 CRITICAL |
Broadcom RAID Controller web interface is vulnerable due to insecure default of HTTP configuration that does not safeguard SESSIONID cookie with SameSite attribute |
0.1% | 2023-08-15 | ||
| 5.5 MEDIUM |
Broadcom RAID Controller web interface is vulnerable to exposure of sensitive data and the keys used for encryption are accessible to any local user on Windows |
0.0% | 2023-08-15 | ||
| 5.5 MEDIUM |
Broadcom RAID Controller web interface is vulnerable to exposure of sensitive data and the keys used for encryption are accessible to any local user on Linux |
0.0% | 2023-08-15 | ||
| 7.5 HIGH |
Broadcom RAID Controller web interface is vulnerable has an insecure default TLS configuration that supports obsolete SHA1-based ciphersuites |
0.1% | 2023-08-15 | ||
| 9.8 CRITICAL |
Broadcom RAID Controller web interface is vulnerable due to usage of Libcurl with LSA has known vulnerabilities |
0.1% | 2023-08-15 | ||
| 9.8 CRITICAL |
Broadcom RAID Controller web interface is vulnerable due to insecure defaults of lacking HTTP Content-Security-Policy headers |
0.1% | 2023-08-15 | ||
| 9.8 CRITICAL |
Broadcom RAID Controller web interface is vulnerable to improper session management of active sessions on Gateway setup |
0.1% | 2023-08-15 | ||
| 6.5 MEDIUM |
Broadcom RAID Controller web interface is vulnerable client-side control bypass leads to unauthorized data access for low privileged user |
0.0% | 2023-08-15 | ||
| 6.5 MEDIUM |
Buffer Overflow vulnerability in libxlsv.1.6.2 allows a remote attacker to execute arbitrary code and cause a denial of service via a crafted XLS file to the unicode_decode_wcstombs function in xlstool.c:266. |
0.7% | 2023-08-15 | ||
|
CVE-2023-35082
KEV
|
9.8 CRITICAL |
An authentication bypass vulnerability in Ivanti EPMM 11.10 and older, allows unauthorized users to access restricted functionality or resources of the application without proper authentication. This vulnerability is unique to CVE-2023-35078 announced earlier. |
94.4% | 2023-08-15 | |
|
CVE-2022-48503
KEV
|
8.8 HIGH |
The issue was addressed with improved bounds checks. This issue is fixed in tvOS 15.6, watchOS 8.7, iOS 15.6 and iPadOS 15.6, macOS Monterey 12.5, Safari 15.6. Processing web content may lead to arbitrary code execution. |
0.3% | 2023-08-14 | |
| 8.8 HIGH |
In TRANSPOSER_SETTINGS of lpp_tran.h, there is a possible out of bounds write due to an incorrect bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is needed for exploitation. |
1.3% | 2023-08-14 | ||
| 7.1 HIGH |
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in AdFoxly AdFoxly – Ad Manager, AdSense Ads & Ads.Txt plugin <= 1.8.5 versions. |
0.1% | 2023-08-14 | ||
| 7.8 HIGH |
An issue was discovered in l2cap_sock_release in net/bluetooth/l2cap_sock.c in the Linux kernel before 6.4.10. There is a use-after-free because the children of an sk are mishandled. |
0.0% | 2023-08-14 | ||
| 5.5 MEDIUM |
An issue was discovered in freedesktop poppler version 20.12.1, allows remote attackers to cause a denial of service (DoS) via crafted .pdf file to FoFiType1C::convertToType1 function. |
0.1% | 2023-08-11 | ||
| 6.5 MEDIUM |
An issue was discovered in freedesktop poppler version 20.12.1, allows remote attackers to cause a denial of service (DoS) via crafted .pdf file to FoFiType1C::cvtGlyph function. |
0.1% | 2023-08-11 | ||
| 9.8 CRITICAL |
GitPython before 3.1.32 does not block insecure non-multi options in clone and clone_from. NOTE: this issue exists because of an incomplete fix for CVE-2022-24439. |
0.4% | 2023-08-11 | ||
|
CVE-2023-38180
KEV
|
7.5 HIGH |
.NET and Visual Studio Denial of Service Vulnerability |
0.9% | 2023-08-08 | |
| 4.5 MEDIUM |
Azure Apache Hadoop Spoofing Vulnerability |
0.3% | 2023-08-08 | ||
| 4.5 MEDIUM |
Azure Apache Ambari Spoofing Vulnerability |
0.3% | 2023-08-08 | ||
| 4.5 MEDIUM |
Azure Apache Oozie Spoofing Vulnerability |
0.3% | 2023-08-08 | ||
| 4.6 MEDIUM |
Azure HDInsight Jupyter Notebook Spoofing Vulnerability |
0.2% | 2023-08-08 | ||
| 4.5 MEDIUM |
Azure Apache Hive Spoofing Vulnerability |
0.3% | 2023-08-08 | ||
| 6.5 MEDIUM |
Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in Elegant themes Divi theme <= 4.20.2 versions. |
0.1% | 2023-08-08 | ||
| 5.5 MEDIUM |
A flaw was found in the Linux kernel's TUN/TAP functionality. This issue could allow a local user to bypass network filters and gain unauthorized access to some resources. The original patches fixing CVE-2023-1076 are incorrect or incomplete. The problem is that the following upstream commits - a096ccca6e50 ("tun: tun_chr_open(): correctly initialize socket uid"), - 66b2c338adce ("tap: tap_open(): correctly initialize socket uid"), pass "inode->i_uid" to sock_init_data_uid() as the last parameter and that turns out to not be accurate. |
0.0% | 2023-08-07 | ||
|
CVE-2023-38950
KEV
|
7.5 HIGH |
A path traversal vulnerability in the iclock API of ZKTeco BioTime v8.5.5 allows unauthenticated attackers to read arbitrary files via supplying a crafted payload. This vulnerability was fixed in version 9.0.120240617.19506 of ZKBioTime. |
80.8% | 2023-08-03 | |
|
CVE-2023-35081
KEV
|
7.2 HIGH |
A path traversal vulnerability in Ivanti EPMM versions (11.10.x < 11.10.0.3, 11.9.x < 11.9.1.2 and 11.8.x < 11.8.1.2) allows an authenticated administrator to write arbitrary files onto the appliance. |
91.1% | 2023-08-03 | |
| 5.4 MEDIUM |
Cross-site Scripting (XSS) - Stored in GitHub repository pimcore/customer-data-framework prior to 3.4.2. |
0.0% | 2023-08-03 | ||
| 4.3 MEDIUM |
The organization selector in Liferay Portal 7.4.3.81 through 7.4.3.85, and Liferay DXP 7.4 update 81 through 85 does not check user permission, which allows remote authenticated users to obtain a list of all organizations. |
0.3% | 2023-08-02 | ||
| 5.4 MEDIUM |
Cross Site Scripting vulnerability in Faculty Evaulation System using PHP/MySQLi v.1.0 allows an attacker to execute arbitrary code via a crafted payload to the page parameter. |
0.2% | 2023-08-01 | ||
| 7.8 HIGH |
Greenshot 1.2.10 and below allows arbitrary code execution because .NET content is insecurely deserialized when a .greenshot file is opened. |
40.8% | 2023-08-01 | ||
|
CVE-2023-37580
KEV
|
6.1 MEDIUM |
Zimbra Collaboration (ZCS) 8 before 8.8.15 Patch 41 allows XSS in the Zimbra Classic Web Client. |
93.9% | 2023-07-31 | |
| 5.5 MEDIUM |
A vulnerability in Outline.cc for Poppler prior to 23.06.0 allows a remote attacker to cause a Denial of Service (DoS) (crash) via a crafted PDF file in OutlineItem::open. |
0.2% | 2023-07-31 | ||
| 6.3 MEDIUM |
A vulnerability was found in SourceCodester Simple Online Mens Salon Management System 1.0. It has been classified as critical. Affected is an unknown function of the file /admin/?page=user/manage_user&id=3. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-235608. |
0.1% | 2023-07-28 | ||
| 2.4 LOW |
A vulnerability was found in SourceCodester Simple Online Mens Salon Management System 1.0 and classified as problematic. This issue affects some unknown processing of the file /admin/?page=user/list. The manipulation of the argument First Name/Last Name/Username leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-235607. |
0.1% | 2023-07-28 |