Vulnerabilities (CVE)

Filtered by NVD-CWE-noinfo
Total 33260 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2011-5330 1 Distributed Ruby Project 1 Distributed Ruby 2024-11-21 7.5 HIGH 9.8 CRITICAL
Distributed Ruby (aka DRuby) 1.8 mishandles the sending of syscalls.
CVE-2011-4943 1 Impresspages 1 Impresspages Cms 2024-11-21 7.5 HIGH 9.8 CRITICAL
ImpressPages CMS v1.0.12 has Unspecified Remote Code Execution (fixed in v1.0.13)
CVE-2011-4917 1 Linux 1 Linux Kernel 2024-11-21 2.1 LOW 5.5 MEDIUM
In the Linux kernel through 3.1 there is an information disclosure issue via /proc/stat.
CVE-2011-4117 1 Cpan 1 Batch\ 2024-11-21 5.0 MEDIUM 7.5 HIGH
The Batch::BatchRun module 1.03 for Perl does not properly handle temporary files.
CVE-2011-4115 1 Cpan 1 Parallel\ 2024-11-21 6.4 MEDIUM 7.5 HIGH
Parallel::ForkManager module before 1.0.0 for Perl does not properly handle temporary files.
CVE-2011-3621 1 Fluxbb 1 Fluxbb 2024-11-21 7.5 HIGH 9.8 CRITICAL
A reverse proxy issue exists in FluxBB before 1.4.7 when FORUM_BEHIND_REVERSE_PROXY is enabled.
CVE-2011-2668 1 Mozilla 1 Firefox 2024-11-21 6.8 MEDIUM 8.8 HIGH
Mozilla Firefox through 1.5.0.3 has a vulnerability in processing the content-length header
CVE-2011-2177 1 Apache 1 Openoffice 2024-11-21 6.8 MEDIUM 7.8 HIGH
OpenOffice.org v3.3 allows execution of arbitrary code with the privileges of the user running the OpenOffice.org suite tools.
CVE-2011-1517 1 Sap 1 Netweaver 2024-11-21 7.5 HIGH 9.8 CRITICAL
SAP NetWeaver 7.0 allows Remote Code Execution and Denial of Service caused by an error in the DiagTraceHex() function. By sending a specially-crafted packet, an attacker could exploit this vulnerability to cause the application to crash.
CVE-2009-1120 1 Dell 1 Emc Replistor 2024-11-21 10.0 HIGH 9.8 CRITICAL
EMC RepliStor Server Service before ESA-09-003 has a DoASOCommand Remote Code Execution Vulnerability. The flaw exists within the DoRcvRpcCall RPC function -exposed via the rep_srv.exe process- where the vulnerability is caused by an error when the rep_srv.exe handles a specially crafted packet sent by an unauthenticated attacker.
CVE-2005-2354 1 Nvu 1 Nvu 2024-11-20 7.5 HIGH 9.8 CRITICAL
Nvu 0.99+1.0pre uses an old copy of Mozilla XPCOM which can result in multiple security issues.
CVE-2003-5001 1 Ibm 1 Iss Blackice Pc Protection 2024-11-20 7.5 HIGH 5.3 MEDIUM
A vulnerability was found in ISS BlackICE PC Protection and classified as critical. Affected by this issue is the component Cross Site Scripting Detection. The manipulation as part of POST/PUT/DELETE/OPTIONS Request leads to privilege escalation. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. It is recommended to upgrade the affected component. NOTE: This vulnerability only affects products that are no longer supported by the maintainer
CVE-2024-46827 1 Linux 1 Linux Kernel 2024-11-20 N/A 5.5 MEDIUM
In the Linux kernel, the following vulnerability has been resolved: wifi: ath12k: fix firmware crash due to invalid peer nss Currently, if the access point receives an association request containing an Extended HE Capabilities Information Element with an invalid MCS-NSS, it triggers a firmware crash. This issue arises when EHT-PHY capabilities shows support for a bandwidth and MCS-NSS set for that particular bandwidth is filled by zeros and due to this, driver obtains peer_nss as 0 and sending this value to firmware causes crash. Address this issue by implementing a validation step for the peer_nss value before passing it to the firmware. If the value is greater than zero, proceed with forwarding it to the firmware. However, if the value is invalid, reject the association request to prevent potential firmware crashes. Tested-on: QCN9274 hw2.0 PCI WLAN.WBE.1.0.1-00029-QCAHKSWPL_SILICONZ-1
CVE-2024-50065 1 Linux 1 Linux Kernel 2024-11-20 N/A 5.5 MEDIUM
In the Linux kernel, the following vulnerability has been resolved: ntfs3: Change to non-blocking allocation in ntfs_d_hash d_hash is done while under "rcu-walk" and should not sleep. __get_name() allocates using GFP_KERNEL, having the possibility to sleep when under memory pressure. Change the allocation to GFP_NOWAIT.
CVE-2024-46775 1 Linux 1 Linux Kernel 2024-11-20 N/A 5.5 MEDIUM
In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Validate function returns [WHAT & HOW] Function return values must be checked before data can be used in subsequent functions. This fixes 4 CHECKED_RETURN issues reported by Coverity.
CVE-2024-50968 1 Adonesevangelista 1 Agri-trading Online Shopping System 2024-11-20 N/A 7.5 HIGH
A business logic vulnerability exists in the Add to Cart function of itsourcecode Agri-Trading Online Shopping System 1.0, which allows remote attackers to manipulate the quant parameter when adding a product to the cart. By setting the quantity value to -0, an attacker can exploit a flaw in the application's total price calculation logic. This vulnerability causes the total price to be reduced to zero, allowing the attacker to add items to the cart and proceed to checkout.
CVE-2023-35686 1 Google 1 Android 2024-11-20 N/A 7.8 HIGH
In PVRSRVRGXKickTA3DKM of rgxta3d.c, there is a possible arbitrary code execution due to improper input validation. This could lead to local escalation of privilege in the kernel with no additional execution privileges needed. User interaction is not needed for exploitation.
CVE-2023-35659 1 Google 1 Android 2024-11-20 N/A 7.8 HIGH
In DevmemIntChangeSparse of devicemem_server.c, there is a possible arbitrary code execution due to a logic error in the code. This could lead to local escalation of privilege in the kernel with no additional execution privileges needed. User interaction is not needed for exploitation.
CVE-2017-13227 1 Google 1 Android 2024-11-20 N/A 5.5 MEDIUM
In the autofill service, the package name that is provided by the app process is trusted inappropriately.  This could lead to information disclosure with no additional execution privileges needed.  User interaction is not needed for exploitation.
CVE-2024-46820 1 Linux 1 Linux Kernel 2024-11-20 N/A 7.8 HIGH
In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu/vcn: remove irq disabling in vcn 5 suspend We do not directly enable/disable VCN IRQ in vcn 5.0.0. And we do not handle the IRQ state as well. So the calls to disable IRQ and set state are removed. This effectively gets rid of the warining of "WARN_ON(!amdgpu_irq_enabled(adev, src, type))" in amdgpu_irq_put().