Vulnerabilities (CVE)

Filtered by NVD-CWE-noinfo
Total 31934 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2024-55653 1 Pwndoc Project 1 Pwndoc 2025-04-18 N/A 6.5 MEDIUM
PwnDoc is a penetration test report generator. In versions up to and including 0.5.3, an authenticated user is able to crash the backend by raising a `UnhandledPromiseRejection` on audits which exits the backend. The user doesn't need to know the audit id, since a bad audit id will also raise the rejection. With the backend being unresponsive, the whole application becomes unusable for all users of the application. As of time of publication, no known patches are available.
CVE-2022-20530 1 Google 1 Android 2025-04-18 N/A 5.3 MEDIUM
In strings.xml, there is a possible permission bypass due to a misleading string. This could lead to remote information disclosure of call logs with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-231585645
CVE-2022-20558 1 Google 1 Android 2025-04-18 N/A 3.3 LOW
In registerReceivers of DeviceCapabilityListener.java, there is a possible way to change preferred TTY mode due to a permissions bypass. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-236264289
CVE-2022-20560 1 Google 1 Android 2025-04-18 N/A 7.5 HIGH
Product: AndroidVersions: Android kernelAndroid ID: A-212623833References: N/A
CVE-2022-20599 1 Google 1 Android 2025-04-18 N/A 6.7 MEDIUM
In Pixel firmware, there is a possible exposure of sensitive memory due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-242332706References: N/A
CVE-2022-20591 1 Google 1 Android 2025-04-18 N/A 5.5 MEDIUM
In ppmpu_set of ppmpu.c, there is a possible information disclosure due to a logic error in the code. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-238939706References: N/A
CVE-2022-20602 1 Google 1 Android 2025-04-18 N/A 7.5 HIGH
Product: AndroidVersions: Android kernelAndroid ID: A-211081867References: N/A
CVE-2022-31707 1 Vmware 1 Vrealize Operations 2025-04-18 N/A 7.2 HIGH
vRealize Operations (vROps) contains a privilege escalation vulnerability. VMware has evaluated the severity of this issue to be in the Important severity range with a maximum CVSSv3 base score of 7.2.
CVE-2022-25626 1 Broadcom 1 Symantec Identity Governance And Administration 2025-04-18 N/A 5.3 MEDIUM
An unauthenticated user can access Identity Manager’s management console specific page URLs. However, the system doesn’t allow the user to carry out server side tasks without a valid web session.
CVE-2022-20601 1 Google 1 Android 2025-04-18 N/A 7.5 HIGH
Product: AndroidVersions: Android kernelAndroid ID: A-204541506References: N/A
CVE-2022-25627 1 Broadcom 1 Symantec Identity Governance And Administration 2025-04-18 N/A 6.7 MEDIUM
An authenticated administrator who has physical access to the environment can carry out Remote Command Execution on Management Console in Symantec Identity Manager 14.4
CVE-2024-30619 1 Chamilo 1 Chamilo Lms 2025-04-18 N/A N/A
Chamilo LMS Version 1.11.26 is vulnerable to Incorrect Access Control. A non-authenticated attacker can request the number of messages and the number of online users via "/main/inc/ajax/message.ajax.php?a=get_count_message" AND "/main/inc/ajax/online.ajax.php?a=get_users_online."
CVE-2024-55630 1 Joplin Project 1 Joplin 2025-04-18 N/A 5.5 MEDIUM
Joplin is a free, open source note taking and to-do application, which can handle a large number of notes organised into notebooks. Joplin's HTML sanitizer allows the `name` attribute to be specified. If `name` is set to the same value as an existing `document` property (e.g. `querySelector`), that property is replaced with the element. This vulnerability's only known impact is denial of service. The note viewer fails to refresh until closed and re-opened with a different note. This issue has been addressed in version 3.2.8 and all users are advised to upgrade. There are no known workarounds for this vulnerability.
CVE-2024-48196 1 Eyoucms 1 Eyoucms 2025-04-18 N/A N/A
An issue in eyouCMS v.1.6.7 allows a remote attacker to obtain sensitive information via a crafted script to the post parameter.
CVE-2023-51018 1 Totolink 2 Ex1800t, Ex1800t Firmware 2025-04-17 N/A 9.8 CRITICAL
TOTOlink EX1800T v9.1.0cu.2112_B20220316 is vulnerable to unauthorized arbitrary command execution in the ‘opmode’ parameter of the setWiFiApConfig interface of the cstecgi .cgi.
CVE-2022-42527 1 Google 1 Android 2025-04-17 N/A 7.5 HIGH
In cd_SsParseMsg of cd_SsCodec.c, there is a possible crash due to a missing null check. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-244448906References: N/A
CVE-2022-46312 1 Huawei 2 Emui, Harmonyos 2025-04-17 N/A 7.5 HIGH
The application management module has a vulnerability in permission verification. Successful exploitation of this vulnerability causes unexpected clear of device applications.
CVE-2023-50121 1 Autelrobotics 2 Evo Nano Drone, Evo Nano Drone Firmware 2025-04-17 N/A 5.7 MEDIUM
Autel EVO NANO drone flight control firmware version 1.6.5 is vulnerable to denial of service (DoS).
CVE-2022-42529 1 Google 1 Android 2025-04-17 N/A 9.8 CRITICAL
Product: AndroidVersions: Android kernelAndroid ID: A-235292841References: N/A
CVE-2017-5689 3 Hpe, Intel, Siemens 71 Proliant Ml10 Gen9 Server, Proliant Ml10 Gen9 Server Firmware, Active Management Technology Firmware and 68 more 2025-04-17 10.0 HIGH 9.8 CRITICAL
An unprivileged network attacker could gain system privileges to provisioned Intel manageability SKUs: Intel Active Management Technology (AMT) and Intel Standard Manageability (ISM). An unprivileged local attacker could provision manageability features gaining unprivileged network or local system privileges on Intel manageability SKUs: Intel Active Management Technology (AMT), Intel Standard Manageability (ISM), and Intel Small Business Technology (SBT).