Vulnerabilities (CVE)

Filtered by NVD-CWE-Other
Total 29483 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2025-24169 1 Apple 2 Macos, Safari 2025-01-31 N/A 7.5 HIGH
A logging issue was addressed with improved data redaction. This issue is fixed in macOS Sequoia 15.3, Safari 18.3. A malicious app may be able to bypass browser extension authentication.
CVE-2024-36506 1 Fortinet 2 Forticlientems, Forticlientems Cloud 2025-01-31 N/A 3.7 LOW
An improper verification of source of a communication channel vulnerability [CWE-940] in FortiClientEMS 7.4.0, 7.2.0 through 7.2.4, 7.0 all versions, 6.4 all versions may allow a remote attacker to bypass the trusted host feature via session connection.
CVE-2024-0159 1 Dell 1 Alienware Command Center 2025-01-31 N/A 6.7 MEDIUM
Dell Alienware Command Center, versions 5.5.52.0 and prior, contain improper access control vulnerability, leading to Denial of Service on local system.
CVE-2023-33251 2 Lightbend, Linux 2 Akka Http, Linux Kernel 2025-01-31 N/A 4.7 MEDIUM
When Akka HTTP before 10.5.2 accepts file uploads via the FileUploadDirectives.fileUploadAll directive, the temporary file it creates has too weak permissions: it is readable by other users on Linux or UNIX, a similar issue to CVE-2022-41946.
CVE-2023-32700 3 Luatex Project, Miktex, Tug 3 Luatex, Miktex, Tex Live 2025-01-31 N/A 7.8 HIGH
LuaTeX before 1.17.0 allows execution of arbitrary shell commands when compiling a TeX file obtained from an untrusted source. This occurs because luatex-core.lua lets the original io.popen be accessed. This also affects TeX Live before 2023 r66984 and MiKTeX before 23.5.
CVE-2024-22452 1 Dell 1 Display And Peripheral Manager 2025-01-31 N/A 7.3 HIGH
Dell Display and Peripheral Manager for macOS prior to 1.3 contains an improper access control vulnerability. A low privilege user could potentially exploit this vulnerability by modifying files in the installation folder to execute arbitrary code, leading to privilege escalation.
CVE-2023-48674 1 Dell 346 Latitude 5280, Latitude 5280 Firmware, Latitude 5288 and 343 more 2025-01-31 N/A 6.8 MEDIUM
Dell Platform BIOS contains an Improper Null Termination vulnerability. A high privilege user with network access to the system could potentially send malicious data to the device in order to cause some services to cease to function.
CVE-2023-29861 1 Flir 2 Dvtel Camera, Dvtel Camera Firmware 2025-01-31 N/A 9.8 CRITICAL
An issue found in FLIR-DVTEL version not specified allows a remote attacker to execute arbitrary code via a crafted request to the management page of the device.
CVE-2023-27920 1 Contec 4 Sv-cpt-mc310, Sv-cpt-mc310 Firmware, Sv-cpt-mc310f and 1 more 2025-01-31 N/A 4.3 MEDIUM
Improper access control vulnerability in the system date/time setting page of SolarView Compact SV-CPT-MC310 versions prior to Ver.8.10 and SV-CPT-MC310F versions prior to Ver.8.10 allows a remote authenticated attacker to alter system date/time of the affected product.
CVE-2023-2445 1 Devolutions 1 Devolutions Server 2025-01-30 N/A 4.9 MEDIUM
Improper access control in Subscriptions Folder path filter in Devolutions Server 2023.1.1 and earlier allows attackers with administrator privileges to retrieve usage information on folders in user vaults via a specific folder name.
CVE-2023-26546 1 Echa.europa 1 Iuclid 2025-01-30 N/A 8.8 HIGH
European Chemicals Agency IUCLID before 6.27.6 allows remote authenticated users to execute arbitrary code via Server Side Template Injection (SSTI) with a crafted template file. The attacker must have template manager permission.
CVE-2022-47874 1 Jedox 2 Cloud, Jedox 2025-01-30 N/A 6.5 MEDIUM
Improper Access Control in /tc/rpc in Jedox GmbH Jedox 2020.2.5 allows remote authenticated users to view details of database connections via class 'com.jedox.etl.mngr.Connections' and method 'getGlobalConnection'.
CVE-2024-4712 2 Microsoft, Papercut 3 Windows, Papercut Mf, Papercut Ng 2025-01-30 N/A 7.8 HIGH
An arbitrary file creation vulnerability exists in PaperCut NG/MF that only affects Windows servers with Web Print enabled. This specific flaw exists within the image-handler process, which can incorrectly create files that don’t exist when a maliciously formed payload is provided. This can lead to local privilege escalation. Note: This CVE has been split into two (CVE-2024-4712 and CVE-2024-8405) and it’s been rescored with a "Privileges Required (PR)" rating of low, and “Attack Complexity (AC)” rating of low, reflecting the worst-case scenario where an Administrator has granted local login access to standard network users on the host server.
CVE-2022-33973 2 Intel, Microsoft 3 Wlan Authentication And Privacy Infrastructure, Windows 10, Windows 11 2025-01-29 N/A 3.3 LOW
Improper access control in the Intel(R) WAPI Security software for Windows 10/11 before version 22.2150.0.1 may allow an authenticated user to potentially enable information disclosure via local access.
CVE-2023-26282 1 Ibm 1 Watson Cp4d Data Stores 2025-01-29 N/A 4.2 MEDIUM
IBM Watson CP4D Data Stores 4.6.0 through 4.6.3 could allow a user with physical access and specific knowledge of the system to modify files or data on the system. IBM X-Force ID: 248415.
CVE-2023-28512 1 Ibm 1 Watson Cp4d Data Stores 2025-01-29 N/A 5.9 MEDIUM
IBM Watson CP4D Data Stores 4.6.0, 4.6.1, and 4.6.2 could allow an attacker with specific knowledge about the system to manipulate data due to improper input validation. IBM X-Force ID: 250396.
CVE-2024-49804 1 Ibm 1 Security Verify Access 2025-01-29 N/A 7.8 HIGH
IBM Security Verify Access Appliance 10.0.0 through 10.0.8 could allow a locally authenticated non-administrative user to escalate their privileges due to unnecessary permissions used to perform certain tasks.
CVE-2022-26024 1 Intel 22 Nuc7i3dnbe, Nuc7i3dnbe Firmware, Nuc7i3dnhe and 19 more 2025-01-29 N/A 6.7 MEDIUM
Improper access control in the Intel(R) NUC HDMI Firmware Update Tool for NUC7i3DN, NUC7i5DN and NUC7i7DN before version 1.78.2.0.7 may allow an authenticated user to potentially enable escalation of privilege via local access.
CVE-2024-45647 1 Ibm 2 Security Verify Access, Security Verify Access Docker 2025-01-29 N/A 5.6 MEDIUM
IBM Security Verify Access 10.0.0 through 10.0.8 and IBM Security Verify Access Docker 10.0.0 through 10.0.8 could allow could an unverified user to change the password of an expired user without prior knowledge of that password.
CVE-2024-35141 1 Ibm 1 Security Verify Access Docker 2025-01-29 N/A 7.8 HIGH
IBM Security Verify Access Docker 10.0.0 through 10.0.6 could allow a local user to escalate their privileges due to execution of unnecessary privileges.