| CVE |
Vendors |
Products |
Updated |
CVSS v3.1 |
| The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect system availability. |
| The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect system availability. |
| The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect data confidentiality. |
| The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect system availability. |
| The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect data confidentiality. |
| The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect data confidentiality. |
| The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect system availability. |
| The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect system availability. |
| The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect data confidentiality. |
| The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect system availability. |
| The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect data confidentiality. |
| The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect data confidentiality. |
| Improper access control for some Intel(R) Arc(TM) graphics cards A770 and A750 Limited Edition sold between October of 2022 and December of 2022 may allow an authenticated user to potentially enable denial of service or infomation disclosure via local access. |
| In Gitea through 1.17.1, repo cloning can occur in the migration function. |
| Zoho ManageEngine OpManager, OpManager Plus, OpManager MSP, Network Configuration Manager, NetFlow Analyzer, and OpUtils before 125658, 126003, 126105, and 126120 allow authenticated users to make database changes that lead to remote code execution in the NMAP feature. |
| Doufox v0.0.4 was discovered to contain a remote code execution (RCE) vulnerability via the edit file page. This vulnerability allows attackers to execute arbitrary code via a crafted PHP file. |
| Micro-Star International Co., Ltd MSI Center 1.0.50.0 was discovered to contain a vulnerability in the component C_Features of MSI.CentralServer.exe. This vulnerability allows attackers to escalate privileges via running a crafted executable. |
| Certain 5400 RPM hard drives, for laptops and other PCs in approximately 2005 and later, allow physically proximate attackers to cause a denial of service (device malfunction and system crash) via a resonant-frequency attack with the audio signal from the Rhythm Nation music video. A reported product is Seagate STDT4000100 763649053447. |
| IBM Cloud Pak for Security (CP4S) 1.10.0.0 through 1.10.11.0 and IBM QRadar Software Suite 1.10.12.0 through 1.10.21.0 allows web pages to be stored locally which can be read by another user on the system. IBM X-Force ID: 233673. |
| Apache Airflow Docker's Provider prior to 3.0.0 shipped with an example DAG that was vulnerable to (authenticated) remote code exploit of code on the Airflow worker host. |