Total
11827 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2023-38293 | 2024-08-02 | 7.3 High | ||
Certain software builds for the Nokia C200 and Nokia C100 Android devices contain a vulnerable, pre-installed app with a package name of com.tracfone.tfstatus (versionCode='31', versionName='12') that allows local third-party apps to execute arbitrary AT commands in its context (radio user) via AT command injection due to inadequate access control and inadequate input filtering. No permissions or special privileges are necessary to exploit the vulnerability in the com.tracfone.tfstatus app. No user interaction is required beyond installing and running a third-party app. The software build fingerprints for each confirmed vulnerable device are as follows: Nokia C200 (Nokia/Drake_02US/DRK:12/SP1A.210812.016/02US_1_080:user/release-keys and Nokia/Drake_02US/DRK:12/SP1A.210812.016/02US_1_040:user/release-keys) and Nokia C100 (Nokia/DrakeLite_02US/DKT:12/SP1A.210812.016/02US_1_270:user/release-keys, Nokia/DrakeLite_02US/DKT:12/SP1A.210812.016/02US_1_190:user/release-keys, Nokia/DrakeLite_02US/DKT:12/SP1A.210812.016/02US_1_130:user/release-keys, Nokia/DrakeLite_02US/DKT:12/SP1A.210812.016/02US_1_110:user/release-keys, Nokia/DrakeLite_02US/DKT:12/SP1A.210812.016/02US_1_080:user/release-keys, and Nokia/DrakeLite_02US/DKT:12/SP1A.210812.016/02US_1_050:user/release-keys). This malicious app sends a broadcast Intent to the receiver component named com.tracfone.tfstatus/.TFStatus. This broadcast receiver extracts a string from the Intent and uses it as an extra when it starts the com.tracfone.tfstatus/.TFStatusActivity activity component which uses the externally controlled string as an input to execute an AT command. There are two different injection techniques to successfully inject arbitrary AT commands to execute. | ||||
CVE-2023-38156 | 1 Microsoft | 1 Azure Hdinsights | 2024-08-02 | 7.2 High |
Azure HDInsight Apache Ambari JDBC Injection Elevation of Privilege Vulnerability | ||||
CVE-2023-37241 | 1 Huawei | 2 Emui, Harmonyos | 2024-08-02 | 7.5 High |
Input verification vulnerability in the WMS API. Successful exploitation of this vulnerability may cause the device to restart. | ||||
CVE-2023-36912 | 1 Microsoft | 20 Windows 10, Windows 10 1507, Windows 10 1607 and 17 more | 2024-08-02 | 7.5 High |
Microsoft Message Queuing Denial of Service Vulnerability | ||||
CVE-2023-36899 | 1 Microsoft | 11 .net, .net Framework, Windows 10 1809 and 8 more | 2024-08-02 | 8.8 High |
ASP.NET Elevation of Privilege Vulnerability | ||||
CVE-2023-36893 | 1 Microsoft | 4 365 Apps, Office, Office Long Term Servicing Channel and 1 more | 2024-08-02 | 6.5 Medium |
Microsoft Outlook Spoofing Vulnerability | ||||
CVE-2023-36872 | 1 Microsoft | 1 Vp9 Video Extensions | 2024-08-02 | 5.5 Medium |
VP9 Video Extensions Information Disclosure Vulnerability | ||||
CVE-2023-36873 | 1 Microsoft | 13 .net, .net Framework, Windows 10 1607 and 10 more | 2024-08-02 | 7.4 High |
.NET Framework Spoofing Vulnerability | ||||
CVE-2023-36767 | 1 Microsoft | 3 365 Apps, Office, Office Long Term Servicing Channel | 2024-08-02 | 4.3 Medium |
Microsoft Office Security Feature Bypass Vulnerability | ||||
CVE-2023-36761 | 1 Microsoft | 4 365 Apps, Office, Office Long Term Servicing Channel and 1 more | 2024-08-02 | 6.5 Medium |
Microsoft Word Information Disclosure Vulnerability | ||||
CVE-2023-36762 | 1 Microsoft | 5 365 Apps, Office, Office Long Term Servicing Channel and 2 more | 2024-08-02 | 7.3 High |
Microsoft Word Remote Code Execution Vulnerability | ||||
CVE-2023-36706 | 1 Microsoft | 8 Windows Server 2008, Windows Server 2008 R2, Windows Server 2008 Sp2 and 5 more | 2024-08-02 | 6.5 Medium |
Windows Deployment Services Information Disclosure Vulnerability | ||||
CVE-2023-36731 | 1 Microsoft | 19 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 16 more | 2024-08-02 | 7.8 High |
Win32k Elevation of Privilege Vulnerability | ||||
CVE-2023-36707 | 1 Microsoft | 5 Windows Server 2012, Windows Server 2012 R2, Windows Server 2016 and 2 more | 2024-08-02 | 6.5 Medium |
Windows Deployment Services Denial of Service Vulnerability | ||||
CVE-2023-36697 | 1 Microsoft | 20 Windows 10, Windows 10 1507, Windows 10 1607 and 17 more | 2024-08-02 | 6.8 Medium |
Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability | ||||
CVE-2023-36719 | 1 Microsoft | 23 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 20 more | 2024-08-02 | 7.8 High |
Microsoft Speech Application Programming Interface (SAPI) Elevation of Privilege Vulnerability | ||||
CVE-2023-36566 | 1 Microsoft | 5 Common Data Model Sdk, Common Data Model Sdk For Csharp, Common Data Model Sdk For Java and 2 more | 2024-08-02 | 6.5 Medium |
Microsoft Common Data Model SDK Denial of Service Vulnerability | ||||
CVE-2023-36585 | 1 Microsoft | 19 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 16 more | 2024-08-02 | 7.5 High |
Windows upnphost.dll Denial of Service Vulnerability | ||||
CVE-2023-36407 | 1 Microsoft | 9 Windows 11 21h2, Windows 11 21h2, Windows 11 22h2 and 6 more | 2024-08-02 | 7.8 High |
Windows Hyper-V Elevation of Privilege Vulnerability | ||||
CVE-2023-36505 | 2024-08-02 | 6.8 Medium | ||
Improper Input Validation vulnerability in Saturday Drive Ninja Forms Contact Form.This issue affects Ninja Forms Contact Form : from n/a through 3.6.24. |