Total
210374 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2023-23135 | 1 Ftdms Project | 1 Ftdms | 2023-02-08 | N/A | 7.2 HIGH |
An arbitrary file upload vulnerability in Ftdms v3.1.6 allows attackers to execute arbitrary code via uploading a crafted JPG file. | |||||
CVE-2022-24324 | 1 Schneider-electric | 1 Interactive Graphical Scada System | 2023-02-08 | N/A | 9.8 CRITICAL |
A CWE-120: Buffer Copy without Checking Size of Input vulnerability exists that could cause a stack-based buffer overflow potentially leading to remote code execution when an attacker sends a specially crafted message. Affected Products: IGSS Data Server - IGSSdataServer.exe (Versions prior to V15.0.0.22073) | |||||
CVE-2022-34443 | 1 Dell | 1 Rugged Control Center | 2023-02-08 | N/A | 7.8 HIGH |
Dell Rugged Control Center, versions prior to 4.5, contain an Improper Input Validation in the Service EndPoint. A Local Low Privilege attacker could potentially exploit this vulnerability, leading to an Escalation of privileges. | |||||
CVE-2022-34459 | 1 Dell | 3 Alienware Update, Command Update, Update | 2023-02-08 | N/A | 7.8 HIGH |
Dell Command | Update, Dell Update, and Alienware Update versions prior to 4.7 contain a improper verification of cryptographic signature in get applicable driver component. A local malicious user could potentially exploit this vulnerability leading to malicious payload execution. | |||||
CVE-2022-34458 | 1 Dell | 3 Alienware Update, Command Update, Update | 2023-02-08 | N/A | 5.5 MEDIUM |
Dell Command | Update, Dell Update, and Alienware Update versions prior to 4.7 contain a Exposure of Sensitive System Information to an Unauthorized Control Sphere vulnerability in download operation component. A local malicious user could potentially exploit this vulnerability leading to the disclosure of confidential data. | |||||
CVE-2023-23846 | 1 Open5gs | 1 Open5gs | 2023-02-08 | N/A | 7.5 HIGH |
Due to insufficient length validation in the Open5GS GTP library versions prior to versions 2.4.13 and 2.5.7, when parsing extension headers in GPRS tunneling protocol (GPTv1-U) messages, a protocol payload with any extension header length set to zero causes an infinite loop. The affected process becomes immediately unresponsive, resulting in denial of service and excessive resource consumption. CVSS3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C | |||||
CVE-2022-4062 | 1 Schneider-electric | 1 Ecostruxure Power Commission | 2023-02-08 | N/A | 3.3 LOW |
A CWE-285: Improper Authorization vulnerability exists that could cause unauthorized access to certain software functions when an attacker gets access to localhost interface of the EcoStruxure Power Commission application. Affected Products: EcoStruxure Power Commission (Versions prior to V2.25) | |||||
CVE-2022-45095 | 1 Dell | 1 Emc Powerscale Onefs | 2023-02-08 | N/A | 6.7 MEDIUM |
Dell PowerScale OneFS, 8.2.x-9.4.x, contain a command injection vulnerability. An authenticated user having access local shell and having the privilege to gather logs from the cluster could potentially exploit this vulnerability, leading to execute arbitrary commands, denial of service, information disclosure, and data deletion. | |||||
CVE-2022-25906 | 1 Is-http2 Project | 1 Is-http2 | 2023-02-08 | N/A | 7.8 HIGH |
All versions of the package is-http2 are vulnerable to Command Injection due to missing input sanitization or other checks, and sandboxes being employed to the isH2 function. | |||||
CVE-2022-25916 | 1 Mt7688-wiscan Project | 1 Mt7688-wiscan | 2023-02-08 | N/A | 7.8 HIGH |
Versions of the package mt7688-wiscan before 0.8.3 are vulnerable to Command Injection due to improper input sanitization in the 'wiscan.scan' function. | |||||
CVE-2023-22572 | 1 Dell | 1 Emc Powerscale Onefs | 2023-02-08 | N/A | 7.8 HIGH |
Dell PowerScale OneFS 9.1.0.x-9.4.0.x contain an insertion of sensitive information into log file vulnerability in change password api. A low privilege local attacker could potentially exploit this vulnerability, leading to system takeover. | |||||
CVE-2023-0609 | 1 Wallabag | 1 Wallabag | 2023-02-08 | N/A | 4.3 MEDIUM |
Improper Authorization in GitHub repository wallabag/wallabag prior to 2.5.3. | |||||
CVE-2023-0607 | 1 Projectsend | 1 Projectsend | 2023-02-08 | N/A | 4.8 MEDIUM |
Cross-site Scripting (XSS) - Stored in GitHub repository projectsend/projectsend prior to r1606. | |||||
CVE-2022-32748 | 1 Schneider-electric | 1 Ecostruxure Cybersecurity Admin Expert | 2023-02-08 | N/A | 8.1 HIGH |
A CWE-295: Improper Certificate Validation vulnerability exists that could cause the CAE software to give wrong data to end users when using CAE to configure devices. Additionally, credentials could leak which would enable an attacker the ability to log into the configuration tool and compromise other devices in the network. Affected Products: EcoStruxureâ„¢ Cybersecurity Admin Expert (CAE) (Versions prior to 2.2) | |||||
CVE-2022-45101 | 1 Dell | 1 Emc Powerscale Onefs | 2023-02-08 | N/A | 9.8 CRITICAL |
Dell PowerScale OneFS 9.0.0.x - 9.4.0.x, contains an Improper Handling of Insufficient Privileges vulnerability in NFS. A remote unauthenticated attacker could potentially exploit this vulnerability, leading to information disclosure and remote execution. | |||||
CVE-2022-45897 | 1 Xerox | 2 Workcentre 3550, Workcentre 3550 Firmware | 2023-02-08 | N/A | 6.5 MEDIUM |
On Xerox WorkCentre 3550 25.003.03.000 devices, an authenticated attacker can view the SMB server settings and can obtain the stored cleartext credentials associated with those settings. | |||||
CVE-2022-45097 | 1 Dell | 1 Emc Powerscale Onefs | 2023-02-08 | N/A | 8.8 HIGH |
Dell PowerScale OneFS 9.0.0.x-9.4.0.x contains an Incorrect User Management vulnerability. A low privileged network attacker could potentially exploit this vulnerability, leading to escalation of privileges, and information disclosure. | |||||
CVE-2022-45096 | 1 Dell | 1 Emc Powerscale Onefs | 2023-02-08 | N/A | 6.5 MEDIUM |
Dell PowerScale OneFS, 8.2.0 through 9.3.0, contain an User Interface Security Issue. An unauthenticated remote user could unintentionally lead an administrator to enable this vulnerability, leading to disclosure of information. | |||||
CVE-2022-47700 | 1 Comfast Project | 2 Cf-wr623n, Cf-wr623n Firmware | 2023-02-08 | N/A | 7.5 HIGH |
COMFAST (Shenzhen Sihai Zhonglian Network Technology Co., Ltd) CF-WR623N Router firmware V2.3.0.1 and before is vulnerable to Incorrect Access Control. Improper authentication allows requests to be made to back-end scripts without a valid session or authentication. | |||||
CVE-2022-47699 | 1 Comfast Project | 2 Cf-wr623n, Cf-wr623n Firmware | 2023-02-08 | N/A | 9.8 CRITICAL |
COMFAST (Shenzhen Sihai Zhonglian Network Technology Co., Ltd) CF-WR623N Router firmware V2.3.0.1 is vulnerable to Incorrect Access Control. |