Total
53149 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2024-7324 | 1 Iobit | 1 Itop Data Recovery Pro | 2024-08-01 | 7.8 High |
A vulnerability was found in IObit iTop Data Recovery Pro 4.4.0.687. It has been declared as critical. Affected by this vulnerability is an unknown functionality in the library madbasic_.bpl of the component BPL Handler. The manipulation leads to uncontrolled search path. Local access is required to approach this attack. The associated identifier of this vulnerability is VDB-273247. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | ||||
CVE-2022-4001 | 1 Motorola | 1 Q14 Mesh Router Firmware | 2024-08-01 | 7.3 High |
An authentication bypass vulnerability could allow an attacker to access API functions without authentication. | ||||
CVE-2024-41950 | 1 Deepset | 1 Haystack | 2024-08-01 | 7.5 High |
Haystack is an end-to-end LLM framework that allows you to build applications powered by LLMs, Transformer models, vector search and more. Haystack clients that let their users create and run Pipelines from scratch are vulnerable to remote code executions. Certain Components in Haystack use Jinja2 templates, if anyone can create and render that template on the client machine they run any code. The vulnerability has been fixed with Haystack `2.3.1`. | ||||
CVE-2024-6770 | 1 Vikasratudi | 1 Lifetime Free Drag \& Drop Contact Form Builder For Wordpress Vform | 2024-07-31 | 7.2 High |
The Lifetime free Drag & Drop Contact Form Builder for WordPress VForm plugin for WordPress is vulnerable to Stored Cross-Site Scripting in all versions up to, and including, 2.1.5 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | ||||
CVE-2024-25131 | 2024-06-03 | 8.8 High | ||
A flaw was found in the MustGather.managed.openshift.io Custom Defined Resource (CRD) of OpenShift Dedicated. A non-privileged user on the cluster can create a MustGather object with a specially crafted file and set the most privileged service account to run the job. This can allow a standard developer user to escalate their privileges to a cluster administrator and pivot to the AWS environment. | ||||
CVE-2023-50977 | 2024-05-28 | 7.5 High | ||
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that there was not reasonable evidence to determine the existence of a vulnerability. See also CVE-2024-36472. | ||||
CVE-2022-27458 | 1 Redhat | 2 Enterprise Linux, Rhel Software Collections | 2024-05-01 | 7.5 High |
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2022-27447. Reason: This candidate is a reservation duplicate of CVE-2022-27447. Notes: All CVE users should reference CVE-2022-27447 instead of this candidate. | ||||
CVE-2024-26624 | 2024-03-27 | 7.1 High | ||
This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. | ||||
CVE-2021-46907 | 2024-03-19 | 7.1 High | ||
This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. | ||||
CVE-2023-20577 | 2024-02-13 | 7.4 High | ||
A vulnerability was found in AMD hardware due to a heap overflow in the SMM module. This issue could allow a local unauthenticated attacker to enable writing to SPI flash to execute arbitrary code. | ||||
CVE-2023-20576 | 2024-02-13 | 7.7 High | ||
A vulnerability was found in AMD hardware due to insufficient verification of data authenticity in AGESA. This issue may allow a local unauthenticated attacker to update SPI ROM data, potentially resulting in denial of service or privilege escalation. | ||||
CVE-2024-9779 | 2023-11-30 | 7.5 High | ||
A flaw was found in Open Cluster Management (OCM) when a user has access to the worker nodes which contain the cluster-manager or klusterlet deployments. The cluster-manager deployment uses a service account with the same name "cluster-manager" which is bound to a ClusterRole also named "cluster-manager", which includes the permission to create Pod resources. If this deployment runs a pod on an attacker-controlled node, the attacker can obtain the cluster-manager's token and steal any service account token by creating and mounting the target service account to control the whole cluster. | ||||
CVE-2023-4128 | 1 Redhat | 7 Enterprise Linux, Rhel Aus, Rhel E4s and 4 more | 2023-11-14 | 7.8 High |
** REJECT ** DO NOT USE THIS CVE RECORD. ConsultIDs: CVE-2023-4206, CVE-2023-4207, CVE-2023-4208. Reason: This record is a duplicate of CVE-2023-4206, CVE-2023-4207, CVE-2023-4208. Notes: All CVE users should reference CVE-2023-4206, CVE-2023-4207, CVE-2023-4208 instead of this record. All references and descriptions in this record have been removed to prevent accidental usage. | ||||
CVE-2023-30079 | 1 Redhat | 2 Enterprise Linux, Rhel Eus | 2023-11-07 | 8.8 High |
DO NOT USE THIS CVE RECORD. ConsultIDs: CVE-2023-22652. Reason: This record is a duplicate of CVE-2023-22652. Notes: All CVE users should reference CVE-2023-22652 instead of this record. All references and descriptions in this record have been removed to prevent accidental usage. | ||||
CVE-2023-30078 | 2023-11-07 | 8.8 High | ||
DO NOT USE THIS CVE RECORD. ConsultIDs: CVE-2023-32181. Reason: This record is a duplicate of CVE-2023-32181. Notes: All CVE users should reference CVE-2023-32181 instead of this record. All references and descriptions in this record have been removed to prevent accidental usage. | ||||
CVE-2022-40156 | 1 Redhat | 2 Camel Quarkus, Camel Spring Boot | 2023-11-07 | 7.5 High |
DO NOT USE THIS CANDIDATE NUMBER. Reason: This CVE has been rejected as it was incorrectly assigned. All references and descriptions in this candidate have been removed to prevent accidental usage. | ||||
CVE-2022-40155 | 1 Redhat | 1 Camel Quarkus | 2023-11-07 | 7.5 High |
DO NOT USE THIS CANDIDATE NUMBER. Reason: This CVE has been rejected as it was incorrectly assigned. All references and descriptions in this candidate have been removed to prevent accidental usage. | ||||
CVE-2022-40154 | 1 Redhat | 1 Camel Quarkus | 2023-11-07 | 7.5 High |
DO NOT USE THIS CANDIDATE NUMBER. Reason: This CVE has been rejected as it was incorrectly assigned. All references and descriptions in this candidate have been removed to prevent accidental usage. | ||||
CVE-2022-40153 | 1 Redhat | 1 Camel Quarkus | 2023-11-07 | 7.5 High |
DO NOT USE THIS CANDIDATE NUMBER. Reason: This CVE has been rejected as it was incorrectly assigned. All references and descriptions in this candidate have been removed to prevent accidental usage. | ||||
CVE-2022-3757 | 2023-11-07 | 8.8 High | ||
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none. |