Total
542 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2023-21422 | 1 Samsung | 1 Android | 2023-02-21 | 5.5 Medium |
Improper authorization vulnerability in semAddPublicDnsAddr in WifiSevice prior to SMR Jan-2023 Release 1 allows attackers to set custom DNS server without permission via binding WifiService. | ||||
CVE-2023-21432 | 1 Samsung | 1 Smart Things | 2023-02-21 | 7.8 High |
Improper access control vulnerabilities in Smart Things prior to 1.7.93 allows to attacker to invite others without authorization of the owner. | ||||
CVE-2023-21433 | 1 Samsung | 1 Galaxy Store | 2023-02-17 | 7.8 High |
Improper access control vulnerability in Galaxy Store prior to version 4.5.49.8 allows local attackers to install applications from Galaxy Store. | ||||
CVE-2022-3229 | 2 Microsoft, Unifiedremote | 2 Windows, Unified Remote | 2023-02-15 | 9.8 Critical |
Because the web management interface for Unified Intents' Unified Remote solution does not itself require authentication, a remote, unauthenticated attacker can change or disable authentication requirements for the Unified Remote protocol, and leverage this now-unauthenticated access to run code of the attacker's choosing. | ||||
CVE-2019-10159 | 1 Redhat | 2 Cfme-gemset, Cloudforms | 2023-02-12 | 4.3 Medium |
cfme-gemset versions 5.10.4.3 and below, 5.9.9.3 and below are vulnerable to a data leak, due to an improper authorization in the migration log controller. An attacker with access to an unprivileged user can access all VM migration logs available. | ||||
CVE-2016-7097 | 1 Linux | 1 Linux Kernel | 2023-02-12 | N/A |
The filesystem implementation in the Linux kernel through 4.8.2 preserves the setgid bit during a setxattr call, which allows local users to gain group privileges by leveraging the existence of a setgid program with restrictions on execute permissions. | ||||
CVE-2023-0609 | 1 Wallabag | 1 Wallabag | 2023-02-08 | 4.3 Medium |
Improper Authorization in GitHub repository wallabag/wallabag prior to 2.5.3. | ||||
CVE-2023-0610 | 1 Wallabag | 1 Wallabag | 2023-02-08 | 4.3 Medium |
Improper Authorization in GitHub repository wallabag/wallabag prior to 2.5.3. | ||||
CVE-2022-4868 | 1 Froxlor | 1 Froxlor | 2023-01-06 | 4.3 Medium |
Improper Authorization in GitHub repository froxlor/froxlor prior to 2.0.0-beta1. | ||||
CVE-2022-4804 | 1 Usememos | 1 Memos | 2023-01-05 | 5.3 Medium |
Improper Authorization in GitHub repository usememos/memos prior to 0.9.1. | ||||
CVE-2022-4688 | 1 Usememos | 1 Memos | 2022-12-30 | 8.8 High |
Improper Authorization in GitHub repository usememos/memos prior to 0.9.0. | ||||
CVE-2017-1002151 | 1 Redhat | 1 Pagure | 2022-12-21 | 7.5 High |
Pagure 3.3.0 and earlier is vulnerable to loss of confidentially due to improper authorization | ||||
CVE-2022-39905 | 1 Google | 1 Android | 2022-12-10 | 5.5 Medium |
Implicit intent hijacking vulnerability in Telecom application prior to SMR Dec-2022 Release 1 allows attacker to access sensitive information via implicit intent. | ||||
CVE-2021-39317 | 1 Accesspressthemes | 43 Access Demo Importer, Accesspress-lite, Accesspress-mag and 40 more | 2022-12-09 | 8.8 High |
A WordPress plugin and several WordPress themes developed by AccessPress Themes are vulnerable to malicious file uploads via the plugin_offline_installer AJAX action due to a missing capability check in the plugin_offline_installer_callback function found in the /demo-functions.php file or /welcome.php file of the affected products. The complete list of affected products and their versions are below: WordPress Plugin: AccessPress Demo Importer <=1.0.6 WordPress Themes: accesspress-basic <= 3.2.1 accesspress-lite <= 2.92 accesspress-mag <= 2.6.5 accesspress-parallax <= 4.5 accesspress-root <= 2.5 accesspress-store <= 2.4.9 agency-lite <= 1.1.6 arrival <= 1.4.2 bingle <= 1.0.4 bloger <= 1.2.6 brovy <= 1.3 construction-lite <= 1.2.5 doko <= 1.0.27 edict-lite <= 1.1.4 eightlaw-lite <= 2.1.5 eightmedi-lite <= 2.1.8 eight-sec <= 1.1.4 eightstore-lite <= 1.2.5 enlighten <= 1.3.5 fotography <= 2.4.0 opstore <= 1.4.3 parallaxsome <= 1.3.6 punte <= 1.1.2 revolve <= 1.3.1 ripple <= 1.2.0 sakala <= 1.0.4 scrollme <= 2.1.0 storevilla <= 1.4.1 swing-lite <= 1.1.9 the100 <= 1.1.2 the-launcher <= 1.3.2 the-monday <= 1.4.1 ultra-seven <= 1.2.8 uncode-lite <= 1.3.3 vmag <= 1.2.7 vmagazine-lite <= 1.3.5 vmagazine-news <= 1.0.5 wpparallax <= 2.0.6 wp-store <= 1.1.9 zigcy-baby <= 1.0.6 zigcy-cosmetics <= 1.0.5 zigcy-lite <= 2.0.9 | ||||
CVE-2021-41313 | 1 Atlassian | 2 Jira Data Center, Jira Server | 2022-11-16 | 4.3 Medium |
Affected versions of Atlassian Jira Server and Data Center allow authenticated but non-admin remote attackers to edit email batch configurations via an Improper Authorization vulnerability in the /secure/admin/ConfigureBatching!default.jspa endpoint. The affected versions are before version 8.20.7. | ||||
CVE-2022-39890 | 1 Samsung | 1 Billing | 2022-11-10 | 7.5 High |
Improper Authorization in Samsung Billing prior to version 5.0.56.0 allows attacker to get sensitive information. | ||||
CVE-2020-9048 | 2 Johnsoncontrols, Tyco | 2 Victor Web Client, C-cure Web Client | 2022-10-29 | 8.1 High |
A vulnerability in specified versions of American Dynamics victor Web Client and Software House CCURE Web Client could allow a remote unauthenticated attacker on the network to delete arbitrary files on the system or render the system unusable by conducting a Denial of Service attack. | ||||
CVE-2022-39322 | 1 Keystonejs | 1 Keystone | 2022-10-28 | 9.8 Critical |
@keystone-6/core is a core package for Keystone 6, a content management system for Node.js. Starting with version 2.2.0 and prior to version 2.3.1, users who expected their `multiselect` fields to use the field-level access control - if configured - are vulnerable to their field-level access control not being used. List-level access control is not affected. Field-level access control for fields other than `multiselect` are not affected. Version 2.3.1 contains a fix for this issue. As a workaround, stop using the `multiselect` field. | ||||
CVE-2022-36838 | 1 Samsung | 1 Galaxy Wearable | 2022-10-27 | 4.6 Medium |
Implicit Intent hijacking vulnerability in Galaxy Wearable prior to version 2.2.50 allows attacker to get sensitive information. | ||||
CVE-2022-36837 | 1 Samsung | 1 Samsung Email | 2022-10-27 | 5.5 Medium |
Intent redirection vulnerability using implicit intent in Samsung email prior to version 6.1.70.20 allows attacker to get sensitive information. |