Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CWE CATEGORY:CERT C Secure Coding Standard (2008) Chapter 13 - Error Handling (ERR)
Category ID:746
Vulnerability Mapping:Prohibited
Status:Obsolete
DetailsContent HistoryObserved CVE ExamplesReports
11858Vulnerabilities found

CVE-2024-43455
Assigner-Microsoft Corporation
ShareView Details
Assigner-Microsoft Corporation
CVSS Score-8.8||HIGH
EPSS-4.80% / 89.34%
||
7 Day CHG~0.00%
Published-10 Sep, 2024 | 16:54
Updated-31 Dec, 2024 | 23:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Windows Remote Desktop Licensing Service Spoofing Vulnerability

Windows Remote Desktop Licensing Service Spoofing Vulnerability

Action-Not Available
Vendor-Microsoft Corporation
Product-windows_server_2022_23h2windows_server_2016windows_server_2012windows_server_2022windows_server_2019windows_server_2008Windows Server 2022Windows Server 2008 R2 Service Pack 1Windows Server 2019 (Server Core installation)Windows Server 2008 Service Pack 2 (Server Core installation)Windows Server 2008 R2 Service Pack 1 (Server Core installation)Windows Server 2008 Service Pack 2Windows Server 2012 R2Windows Server 2022, 23H2 Edition (Server Core installation)Windows Server 2016 (Server Core installation)Windows Server 2008 Service Pack 2Windows Server 2012Windows Server 2012 (Server Core installation)Windows Server 2019Windows Server 2012 R2 (Server Core installation)Windows Server 2016
CWE ID-CWE-20
Improper Input Validation
CVE-2024-38245
Assigner-Microsoft Corporation
ShareView Details
Assigner-Microsoft Corporation
CVSS Score-7.8||HIGH
EPSS-0.59% / 68.91%
||
7 Day CHG~0.00%
Published-10 Sep, 2024 | 16:54
Updated-31 Dec, 2024 | 23:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Kernel Streaming Service Driver Elevation of Privilege Vulnerability

Kernel Streaming Service Driver Elevation of Privilege Vulnerability

Action-Not Available
Vendor-Microsoft Corporation
Product-windows_10_21h2windows_10_1809windows_server_2016windows_server_2022_23h2windows_server_2012windows_server_2008windows_10_1507windows_11_21h2windows_11_24h2windows_10_22h2windows_server_2022windows_11_22h2windows_server_2019windows_10_1607windows_11_23h2Windows Server 2022Windows 10 Version 1607Windows 11 version 22H3Windows 11 version 22H2Windows Server 2019 (Server Core installation)Windows Server 2022, 23H2 Edition (Server Core installation)Windows Server 2008 Service Pack 2Windows 10 Version 1809Windows Server 2016 (Server Core installation)Windows 11 version 21H2Windows Server 2012 (Server Core installation)Windows Server 2016Windows 10 Version 1507Windows 10 Version 21H2Windows Server 2008 R2 Service Pack 1Windows 11 Version 23H2Windows Server 2008 Service Pack 2 (Server Core installation)Windows Server 2008 R2 Service Pack 1 (Server Core installation)Windows Server 2012 R2Windows Server 2019Windows Server 2012Windows Server 2008 Service Pack 2Windows Server 2012 R2 (Server Core installation)Windows 10 Version 22H2Windows 11 Version 24H2
CWE ID-CWE-20
Improper Input Validation
CVE-2024-38244
Assigner-Microsoft Corporation
ShareView Details
Assigner-Microsoft Corporation
CVSS Score-7.8||HIGH
EPSS-1.98% / 83.38%
||
7 Day CHG~0.00%
Published-10 Sep, 2024 | 16:54
Updated-31 Dec, 2024 | 23:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Kernel Streaming Service Driver Elevation of Privilege Vulnerability

Kernel Streaming Service Driver Elevation of Privilege Vulnerability

Action-Not Available
Vendor-Microsoft Corporation
Product-windows_10_21h2windows_10_1809windows_server_2016windows_server_2022_23h2windows_10_1507windows_11_21h2windows_11_24h2windows_10_22h2windows_server_2022windows_11_22h2windows_server_2019windows_10_1607windows_11_23h2Windows Server 2022Windows 10 Version 1607Windows 11 version 22H3Windows 11 version 22H2Windows Server 2019 (Server Core installation)Windows Server 2022, 23H2 Edition (Server Core installation)Windows 10 Version 1809Windows Server 2016 (Server Core installation)Windows 11 version 21H2Windows Server 2016Windows 10 Version 1507Windows 10 Version 21H2Windows 11 Version 23H2Windows Server 2019Windows 10 Version 22H2Windows 11 Version 24H2
CWE ID-CWE-20
Improper Input Validation
CVE-2024-38243
Assigner-Microsoft Corporation
ShareView Details
Assigner-Microsoft Corporation
CVSS Score-7.8||HIGH
EPSS-0.40% / 60.53%
||
7 Day CHG~0.00%
Published-10 Sep, 2024 | 16:54
Updated-31 Dec, 2024 | 23:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Kernel Streaming Service Driver Elevation of Privilege Vulnerability

Kernel Streaming Service Driver Elevation of Privilege Vulnerability

Action-Not Available
Vendor-Microsoft Corporation
Product-windows_10_21h2windows_10_1809windows_server_2016windows_server_2022_23h2windows_10_1507windows_11_21h2windows_11_24h2windows_10_22h2windows_server_2022windows_11_22h2windows_server_2019windows_10_1607windows_11_23h2Windows Server 2022Windows 10 Version 1607Windows 11 version 22H3Windows 11 version 22H2Windows Server 2019 (Server Core installation)Windows Server 2022, 23H2 Edition (Server Core installation)Windows 10 Version 1809Windows Server 2016 (Server Core installation)Windows 11 version 21H2Windows Server 2016Windows 10 Version 1507Windows 10 Version 21H2Windows 11 Version 23H2Windows Server 2019Windows 10 Version 22H2Windows 11 Version 24H2
CWE ID-CWE-20
Improper Input Validation
CVE-2024-38234
Assigner-Microsoft Corporation
ShareView Details
Assigner-Microsoft Corporation
CVSS Score-6.5||MEDIUM
EPSS-0.38% / 59.19%
||
7 Day CHG~0.00%
Published-10 Sep, 2024 | 16:54
Updated-31 Dec, 2024 | 23:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Windows Networking Denial of Service Vulnerability

Windows Networking Denial of Service Vulnerability

Action-Not Available
Vendor-Microsoft Corporation
Product-windows_10_21h2windows_10_1809windows_server_2016windows_server_2022_23h2windows_server_2012windows_server_2008windows_10_1507windows_11_21h2windows_11_24h2windows_10_22h2windows_server_2022windows_11_22h2windows_server_2019windows_10_1607windows_11_23h2Windows Server 2022Windows 10 Version 1607Windows 11 version 22H3Windows 11 version 22H2Windows Server 2019 (Server Core installation)Windows Server 2022, 23H2 Edition (Server Core installation)Windows Server 2008 Service Pack 2Windows 10 Version 1809Windows Server 2016 (Server Core installation)Windows 11 version 21H2Windows Server 2012 (Server Core installation)Windows Server 2016Windows 10 Version 1507Windows 10 Version 21H2Windows Server 2008 R2 Service Pack 1Windows 11 Version 23H2Windows Server 2008 Service Pack 2 (Server Core installation)Windows Server 2008 R2 Service Pack 1 (Server Core installation)Windows Server 2012 R2Windows Server 2019Windows Server 2012Windows Server 2008 Service Pack 2Windows Server 2012 R2 (Server Core installation)Windows 10 Version 22H2Windows 11 Version 24H2
CWE ID-CWE-20
Improper Input Validation
CVE-2024-38046
Assigner-Microsoft Corporation
ShareView Details
Assigner-Microsoft Corporation
CVSS Score-7.8||HIGH
EPSS-0.51% / 66.04%
||
7 Day CHG~0.00%
Published-10 Sep, 2024 | 16:53
Updated-31 Dec, 2024 | 23:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
PowerShell Elevation of Privilege Vulnerability

PowerShell Elevation of Privilege Vulnerability

Action-Not Available
Vendor-Microsoft Corporation
Product-windows_10_1809windows_server_2016windows_server_2022_23h2windows_10_1507windows_11_21h2windows_11_24h2windows_10_22h2windows_server_2022windows_11_22h2windows_10_21h1windows_server_2019windows_10_1607windows_11_23h2Windows Server 2022Windows 10 Version 1607Windows 11 version 22H3Windows 11 version 22H2Windows Server 2019 (Server Core installation)Windows Server 2022, 23H2 Edition (Server Core installation)Windows 10 Version 1809Windows Server 2016 (Server Core installation)Windows 11 version 21H2Windows Server 2016Windows 10 Version 1507Windows 10 Version 21H2Windows 11 Version 23H2Windows Server 2019Windows 10 Version 22H2Windows 11 Version 24H2
CWE ID-CWE-20
Improper Input Validation
CVE-2024-37965
Assigner-Microsoft Corporation
ShareView Details
Assigner-Microsoft Corporation
CVSS Score-8.8||HIGH
EPSS-4.84% / 89.38%
||
7 Day CHG~0.00%
Published-10 Sep, 2024 | 16:53
Updated-29 Jan, 2025 | 16:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Microsoft SQL Server Elevation of Privilege Vulnerability

Microsoft SQL Server Elevation of Privilege Vulnerability

Action-Not Available
Vendor-Microsoft Corporation
Product-sql_server_2019sql_server_2017sql_server_2016sql_server_2022Microsoft SQL Server 2022 for (CU 14)Microsoft SQL Server 2016 Service Pack 3 (GDR)Microsoft SQL Server 2019 (GDR)Microsoft SQL Server 2016 Service Pack 3 Azure Connect Feature PackMicrosoft SQL Server 2017 (GDR)Microsoft SQL Server 2017 (CU 31)Microsoft SQL Server 2019 (CU 28)Microsoft SQL Server 2022 (GDR)
CWE ID-CWE-20
Improper Input Validation
CVE-2024-38241
Assigner-Microsoft Corporation
ShareView Details
Assigner-Microsoft Corporation
CVSS Score-7.8||HIGH
EPSS-3.45% / 87.33%
||
7 Day CHG~0.00%
Published-10 Sep, 2024 | 16:53
Updated-31 Dec, 2024 | 23:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Kernel Streaming Service Driver Elevation of Privilege Vulnerability

Kernel Streaming Service Driver Elevation of Privilege Vulnerability

Action-Not Available
Vendor-Microsoft Corporation
Product-windows_10_21h2windows_10_1809windows_server_2016windows_server_2022_23h2windows_10_1507windows_11_21h2windows_11_24h2windows_10_22h2windows_server_2022windows_11_22h2windows_server_2019windows_10_1607windows_11_23h2Windows Server 2022Windows 10 Version 1607Windows 11 version 22H3Windows 11 version 22H2Windows Server 2019 (Server Core installation)Windows Server 2022, 23H2 Edition (Server Core installation)Windows 10 Version 1809Windows Server 2016 (Server Core installation)Windows 11 version 21H2Windows Server 2016Windows 10 Version 1507Windows 10 Version 21H2Windows 11 Version 23H2Windows Server 2019Windows 10 Version 22H2Windows 11 Version 24H2
CWE ID-CWE-20
Improper Input Validation
CVE-2024-38230
Assigner-Microsoft Corporation
ShareView Details
Assigner-Microsoft Corporation
CVSS Score-6.5||MEDIUM
EPSS-7.13% / 91.43%
||
7 Day CHG~0.00%
Published-10 Sep, 2024 | 16:53
Updated-31 Dec, 2024 | 23:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Windows Standards-Based Storage Management Service Denial of Service Vulnerability

Windows Standards-Based Storage Management Service Denial of Service Vulnerability

Action-Not Available
Vendor-Microsoft Corporation
Product-windows_server_2012windows_server_2016windows_server_2019windows_server_2022Windows Server 2022Windows Server 2019 (Server Core installation)Windows Server 2012 R2Windows Server 2016 (Server Core installation)Windows Server 2019Windows Server 2012 R2 (Server Core installation)Windows Server 2016
CWE ID-CWE-20
Improper Input Validation
CVE-2024-38216
Assigner-Microsoft Corporation
ShareView Details
Assigner-Microsoft Corporation
CVSS Score-8.2||HIGH
EPSS-1.23% / 78.96%
||
7 Day CHG~0.00%
Published-10 Sep, 2024 | 16:53
Updated-31 Dec, 2024 | 23:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Azure Stack Hub Elevation of Privilege Vulnerability

Azure Stack Hub Elevation of Privilege Vulnerability

Action-Not Available
Vendor-Microsoft Corporation
Product-azure_stack_hubAzure Stack Hub
CWE ID-CWE-20
Improper Input Validation
CVE-2024-42424
Assigner-Dell
ShareView Details
Assigner-Dell
CVSS Score-5.3||MEDIUM
EPSS-0.05% / 14.03%
||
7 Day CHG~0.00%
Published-10 Sep, 2024 | 08:05
Updated-20 Dec, 2024 | 14:41
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Dell Precision Rack, 14G Intel BIOS versions prior to 2.22.2, contains an Improper Input Validation vulnerability. A high privileged attacker with local access could potentially exploit this vulnerability, leading to Information disclosure.

Action-Not Available
Vendor-Dell Inc.
Product-precision_7920_rack_firmware7920_xl_rack_firmwareprecision_7920_rack7920_xl_rackDell Precision Rack BIOS
CWE ID-CWE-20
Improper Input Validation
CVE-2024-27366
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-4.4||MEDIUM
EPSS-0.05% / 14.43%
||
7 Day CHG~0.00%
Published-09 Sep, 2024 | 00:00
Updated-25 Mar, 2025 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in Samsung Mobile Processor, Wearable Processor Exynos Exynos 980, Exynos 850, Exynos 1080, Exynos 1280, Exynos 1380, Exynos 1330, Exynos 1480, Exynos W920, Exynos W930. In the function slsi_rx_scan_done_ind(), there is no input validation check on a length coming from userspace, which can lead to a potential heap over-read.

Action-Not Available
Vendor-n/aSamsung
Product-exynos_1480_firmwareexynos_1080_firmwareexynos_980_firmwareexynos_1480exynos_1330exynos_850exynos_850_firmwareexynos_w920_firmwareexynos_w920exynos_1280_firmwareexynos_1380_firmwareexynos_1380exynos_w930_firmwareexynos_1330_firmwareexynos_980exynos_1280exynos_w930exynos_1080n/a
CWE ID-CWE-125
Out-of-bounds Read
CWE ID-CWE-20
Improper Input Validation
CVE-2024-8445
Assigner-Red Hat, Inc.
ShareView Details
Assigner-Red Hat, Inc.
CVSS Score-5.7||MEDIUM
EPSS-0.08% / 24.32%
||
7 Day CHG~0.00%
Published-05 Sep, 2024 | 14:24
Updated-06 Nov, 2025 | 23:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
389-ds-base: server crash while modifying `userpassword` using malformed input (incomplete fix for cve-2024-2199)

The fix for CVE-2024-2199 in 389-ds-base was insufficient to cover all scenarios. In certain product versions, an authenticated user may cause a server crash while modifying `userPassword` using malformed input.

Action-Not Available
Vendor-Red Hat, Inc.
Product-Red Hat Enterprise Linux 9Red Hat Enterprise Linux 7 Extended Lifecycle SupportRed Hat Enterprise Linux 6Red Hat Directory Server 12Red Hat Directory Server 11Red Hat Enterprise Linux 8Red Hat Enterprise Linux 10
CWE ID-CWE-20
Improper Input Validation
CVE-2024-45446
Assigner-Huawei Technologies
ShareView Details
Assigner-Huawei Technologies
CVSS Score-5.5||MEDIUM
EPSS-0.04% / 13.40%
||
7 Day CHG~0.00%
Published-04 Sep, 2024 | 02:14
Updated-06 Sep, 2024 | 14:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Access permission verification vulnerability in the camera driver module Impact: Successful exploitation of this vulnerability will affect availability.

Action-Not Available
Vendor-Huawei Technologies Co., Ltd.
Product-emuiharmonyosHarmonyOSEMUI
CWE ID-CWE-20
Improper Input Validation
CVE-2024-45444
Assigner-Huawei Technologies
ShareView Details
Assigner-Huawei Technologies
CVSS Score-5.5||MEDIUM
EPSS-0.06% / 19.48%
||
7 Day CHG~0.00%
Published-04 Sep, 2024 | 01:51
Updated-06 Sep, 2024 | 13:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Access permission verification vulnerability in the WMS module Impact: Successful exploitation of this vulnerability may affect service confidentiality.

Action-Not Available
Vendor-Huawei Technologies Co., Ltd.
Product-emuiharmonyosHarmonyOSEMUIharmonyosemui
CWE ID-CWE-20
Improper Input Validation
CVE-2024-45441
Assigner-Huawei Technologies
ShareView Details
Assigner-Huawei Technologies
CVSS Score-6.2||MEDIUM
EPSS-0.10% / 27.02%
||
7 Day CHG~0.00%
Published-04 Sep, 2024 | 01:37
Updated-12 Sep, 2024 | 19:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Input verification vulnerability in the system service module Impact: Successful exploitation of this vulnerability will affect availability.

Action-Not Available
Vendor-Huawei Technologies Co., Ltd.
Product-emuiharmonyosHarmonyOSEMUI
CWE ID-CWE-20
Improper Input Validation
CVE-2024-44808
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-3.45% / 87.33%
||
7 Day CHG+1.65%
Published-04 Sep, 2024 | 00:00
Updated-05 Sep, 2024 | 12:53
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue in Vypor Attack API System v.1.0 allows a remote attacker to execute arbitrary code via the user GET parameter.

Action-Not Available
Vendor-n/avypor
Product-n/aattack_api_system
CWE ID-CWE-20
Improper Input Validation
CVE-2024-38811
Assigner-VMware by Broadcom
ShareView Details
Assigner-VMware by Broadcom
CVSS Score-8.8||HIGH
EPSS-0.13% / 32.26%
||
7 Day CHG~0.00%
Published-03 Sep, 2024 | 09:47
Updated-17 Sep, 2024 | 13:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Code-execution vulnerability

VMware Fusion (13.x before 13.6) contains a code-execution vulnerability due to the usage of an insecure environment variable. A malicious actor with standard user privileges may exploit this vulnerability to execute code in the context of the Fusion application.

Action-Not Available
Vendor-n/aVMware (Broadcom Inc.)
Product-fusionFusionfusion
CWE ID-CWE-20
Improper Input Validation
CVE-2024-44809
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-1.78% / 82.50%
||
7 Day CHG+0.86%
Published-03 Sep, 2024 | 00:00
Updated-04 Sep, 2024 | 14:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A remote code execution (RCE) vulnerability exists in the Pi Camera project, version 1.0, maintained by RECANTHA. The issue arises from improper sanitization of user input passed to the "position" GET parameter in the tilt.php script. An attacker can exploit this by sending crafted input data that includes malicious command sequences, allowing arbitrary commands to be executed on the server with the privileges of the web server user. This vulnerability is exploitable remotely and poses significant risk if the application is exposed to untrusted networks.

Action-Not Available
Vendor-n/arecantha
Product-n/api_camera_project
CWE ID-CWE-20
Improper Input Validation
CVE-2024-23362
Assigner-Qualcomm, Inc.
ShareView Details
Assigner-Qualcomm, Inc.
CVSS Score-7.1||HIGH
EPSS-0.13% / 31.96%
||
7 Day CHG~0.00%
Published-02 Sep, 2024 | 10:22
Updated-03 Oct, 2025 | 18:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Improper Input Validation in Trusted Execution Environment

Cryptographic issue while parsing RSA keys in COBR format.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qca6426qdu1010_firmwareqca4004qca6698aq_firmwaresnapdragon_8cx_gen_2_5g_compute_platform_\(sc8180x-ac\)sdx55smart_audio_400_platform_firmwarear8031snapdragon_8cx_compute_platform_\(sc8180x-ab\)qcs4290_firmwaresnapdragon_xr2_5g_platform_firmwaresnapdragon_845_mobile_platform_firmwaresd670_firmwarewsa8845qfw7114robotics_rb5_platform_firmwaresd675_firmwaresrv1h_firmwarefastconnect_6200_firmwaresd670snapdragon_855\+\/860_mobile_platform_\(sm8150-ac\)snapdragon_865\+_5g_mobile_platform_\(sm8250-ab\)snapdragon_8cx_gen_2_5g_compute_platform_\(sc8180xp-ab\)qca8081wsa8830_firmwarewsa8840sxr1230psa6145p_firmwaresnapdragon_auto_5g_modem-rf_gen_2snapdragon_835_mobile_pc_platformsnapdragon_678_mobile_platform_\(sm6150-ac\)_firmwareqca9984qam8295psnapdragon_x55_5g_modem-rf_systemqcn6274_firmwaresnapdragon_4_gen_1_mobile_platformsd_675_firmwaresa8540p_firmwaresnapdragon_835_mobile_pc_platform_firmwaresnapdragon_8cx_gen_3_compute_platform_\(sc8280xp-ab\)qcs8550_firmwareqca6574aqdu10109205_lte_modem_firmwareqam8295p_firmwaresd888_firmwaresc8380xp_firmwaresnapdragon_8cx_compute_platform_\(sc8180xp-ac\)_firmwareqru1062_firmwaresnapdragon_x65_5g_modem-rf_systemsa8775pqcn9012sa8155_firmwareqca6564au_firmwareqcn9012_firmwareqcn9024snapdragon_865_5g_mobile_platformsd888qca6430snapdragon_8\+_gen_2_mobile_platformaqt1000sm7250p_firmwaresmart_audio_400_platformsnapdragon_7c\+_gen_3_compute_firmwaresnapdragon_685_4g_mobile_platform_\(sm6225-ad\)sa7255psd_8cxssg2115p_firmwaresnapdragon_675_mobile_platformsnapdragon_7c\+_gen_3_computeqdu1210qrb5165mqrb5165m_firmwaresd855_firmwaresnapdragon_778g\+_5g_mobile_platform_\(sm7325-ae\)fastconnect_7800_firmwaresnapdragon_888_5g_mobile_platformqrb5165nsnapdragon_8_gen_3_mobile_platformsd_675snapdragon_wear_1300_platformqcm2290sxr2130snapdragon_ar2_gen_1_platform_firmwaresdx61_firmwareqca6574ausxr2130_firmwaresm7315sg8275p_firmwareqam8620psnapdragon_678_mobile_platform_\(sm6150-ac\)snapdragon_855\+\/860_mobile_platform_\(sm8150-ac\)_firmwaresa8155p_firmwaressg2115psnapdragon_8cx_gen_2_5g_compute_platform_\(sc8180x-af\)sa7255p_firmwaresxr2230pqca6431snapdragon_865_5g_mobile_platform_firmwarefastconnect_7800sd675sm8550pqca6320_firmwaresa7775p_firmwaresd460sa8255psnapdragon_4_gen_1_mobile_platform_firmwareqca6574qcn7606_firmwareqca6436qcs5430qca6574au_firmwaresnapdragon_685_4g_mobile_platform_\(sm6225-ad\)_firmwaresnapdragon_8_gen_2_mobile_platformwcn3990qcn6274snapdragon_x65_5g_modem-rf_system_firmwareqca6584au_firmwaresnapdragon_8cx_gen_2_5g_compute_platform_\(sc8180x-ac\)_firmwarewcn6755fastconnect_6800fastconnect_6900qca6426_firmwarevision_intelligence_300_platformwcd9335_firmwaresa8295psa9000p_firmwaresnapdragon_8c_compute_platform_\(sc8180xp-ad\)_firmwarewsa8832qam8775pcsra6640_firmwareqdu1110qdx1011_firmwarewcd9341_firmwaresa8620p_firmwaressg2125p_firmwaresd662_firmwaresd865_5g_firmwaresdx61snapdragon_x72_5g_modem-rf_system_firmwaresnapdragon_8_gen_1_mobile_platform_firmwaresnapdragon_780g_5g_mobile_platformsd460_firmwarefastconnect_6800_firmwareqdu1000_firmwareqca6678aq_firmwarewcn3910qsm8350_firmwaresdx55_firmwaresnapdragon_8cx_gen_3_compute_platform_\(sc8280xp-bb\)_firmwaresnapdragon_782g_mobile_platform_\(sm7325-af\)snapdragon_8\+_gen_1_mobile_platform_firmwarerobotics_rb5_platformfastconnect_6700snapdragon_8cx_gen_2_5g_compute_platform_\(sc8180xp-aa\)snapdragon_765_5g_mobile_platform_\(sm7250-aa\)wsa8832_firmwareqfw7114_firmwaresa8530p_firmwaresd855snapdragon_870_5g_mobile_platform_\(sm8250-ac\)snapdragon_8c_compute_platform_\(sc8180x-ad\)_firmwarewcn3950qcc710wsa8835_firmwareqca6431_firmwaresa6145psa8255p_firmwarewsa8830qca6421_firmwaresm4635_firmwareqca6420qca6564a_firmwaresrv1m_firmwaresa6155pqcm5430_firmwarewcn3950_firmwarewcd9380snapdragon_x35_5g_modem-rf_systemqcm6490_firmwaresnapdragon_780g_5g_mobile_platform_firmwarecsra6620sc8380xpqam8775p_firmwaresd835wcn3980qcs6490_firmwaresd_8_gen1_5g_firmwareqam8620p_firmwaresnapdragon_662_mobile_platform_firmwaresnapdragon_x62_5g_modem-rf_systemwcd9378qca6335_firmwareqca6391_firmwarewcd9340_firmwaresnapdragon_778g_5g_mobile_platformwcn3988_firmwaresnapdragon_480_5g_mobile_platform_firmwaresnapdragon_665_mobile_platformwsa8810snapdragon_768g_5g_mobile_platform_\(sm7250-ac\)sxr2250p_firmwaresnapdragon_695_5g_mobile_platform_firmwarevideo_collaboration_vc3_platformwsa8845h_firmwarewcn3910_firmwareqcm8550aqt1000_firmwareqamsrv1hsnapdragon_8\+_gen_1_mobile_platformqca8337sa8770p_firmwareqca6574a_firmwareqca6696_firmwaresm6370qcm4290wcd9380_firmwaresnapdragon_x50_5g_modem-rf_systemqep8111_firmwaresnapdragon_8cx_compute_platform_\(sc8180xp-af\)_firmwaresa8295p_firmwarear8035_firmwaresnapdragon_680_4g_mobile_platform_firmwaresnapdragon_8cx_compute_platform_\(sc8180xp-af\)ar8031_firmwareqca6595au_firmwareflight_rb5_5g_platform_firmwareqca6797aqsnapdragon_460_mobile_platformqca6174asxr2230p_firmwareqcm4490qcn7606sm4125_firmwareqca6698aqsnapdragon_x35_5g_modem-rf_system_firmwarewcd9306_firmwareqamsrv1mqcs8250qrb5165n_firmwaresnapdragon_670_mobile_platform_firmwaresnapdragon_695_5g_mobile_platformsnapdragon_855_mobile_platform_firmwaresa8650p_firmwaresnapdragon_x24_lte_modem_firmwaresrv1lsnapdragon_768g_5g_mobile_platform_\(sm7250-ac\)_firmwaresnapdragon_x24_lte_modemsa6155_firmwarewcd9378_firmwareqca8081_firmwareqcs4290snapdragon_665_mobile_platform_firmwareqcc710_firmwarewcd9335qca6584auwsa8845hwsa8840_firmwarefastconnect_6200snapdragon_765g_5g_mobile_platform_\(sm7250-ab\)_firmwaresnapdragon_870_5g_mobile_platform_\(sm8250-ac\)_firmwareqcn9024_firmwaresnapdragon_778g_5g_mobile_platform_firmwareqcm4490_firmwareqca6421qru1032wsa8815_firmwaresm7315_firmwareqca6595snapdragon_480\+_5g_mobile_platform_\(sm4350-ac\)_firmwarewcn6740_firmwareqdx1010_firmwaresnapdragon_850_mobile_compute_platform_firmwaresnapdragon_888\+_5g_mobile_platform_\(sm8350-ac\)wcd9390snapdragon_8\+_gen_2_mobile_platform_firmwarecsra6620_firmwaresnapdragon_8cx_compute_platform_\(sc8180x-aa\)snapdragon_8cx_gen_2_5g_compute_platform_\(sc8180xp-ab\)_firmwaresnapdragon_850_mobile_compute_platformwsa8835qru1052qcs2290_firmwarevision_intelligence_300_platform_firmwaresnapdragon_8_gen_3_mobile_platform_firmwarewcn3988wcd9390_firmwaresnapdragon_675_mobile_platform_firmwaresm8550p_firmwareqam8255p_firmwaresdx57msm7325p_firmwareqca6678aqvision_intelligence_400_platform_firmwaresa8155wcd9375sm4635srv1l_firmwareqcs4490_firmwaresm8635qam8650p_firmware9205_lte_modemrobotics_rb3_platform_firmwaresnapdragon_778g\+_5g_mobile_platform_\(sm7325-ae\)_firmwaresnapdragon_8cx_gen_2_5g_compute_platform_\(sc8180x-af\)_firmwaresnapdragon_x72_5g_modem-rf_systemqcn6224sa8775p_firmwareqamsrv1m_firmwarewcd9385_firmwarefastconnect_6700_firmwarevideo_collaboration_vc5_platformqcs7230snapdragon_4_gen_2_mobile_platformsnapdragon_888_5g_mobile_platform_firmwarear8035qcm2290_firmwaresnapdragon_8c_compute_platform_\(sc8180x-ad\)snapdragon_8_gen_1_mobile_platformqdx1011snapdragon_8cx_compute_platform_\(sc8180x-ab\)_firmwarevision_intelligence_400_platformsnapdragon_865\+_5g_mobile_platform_\(sm8250-ab\)_firmwaresm7250pwcd9395_firmwareqru1032_firmwareqca6320wcd9306sa8150p_firmwaresnapdragon_480_5g_mobile_platformsa8650psm6370_firmwareqca4004_firmwaressg2125psnapdragon_845_mobile_platformqca6564aqcs8250_firmwareqca6310_firmwareqcs7230_firmwaresnapdragon_x55_5g_modem-rf_system_firmwaresnapdragon_x70_modem-rf_system_firmwarewcn6740sa6155p_firmwareqca6310qcm5430qep8111sdx57m_firmwareqcn6024_firmwaresnapdragon_480\+_5g_mobile_platform_\(sm4350-ac\)talynplusqca6574_firmwareqamsrv1h_firmwareqcm8550_firmwareqam8650pqca6420_firmwaresnapdragon_ar2_gen_1_platformqdu1210_firmwareqfw7124_firmwareflight_rb5_5g_platformwcn3999qca6696sa8540psdx71msd_8cx_firmwaresnapdragon_782g_mobile_platform_\(sm7325-af\)_firmwaresd835_firmwareqsm8350sa8770pqca6595_firmwarewcd9326_firmwaresnapdragon_460_mobile_platform_firmwareqcm6490wsa8810_firmwareqcs6490snapdragon_4_gen_2_mobile_platform_firmwarewcd9370wsa8845_firmwaresd662snapdragon_8cx_compute_platform_\(sc8180x-aa\)_firmwaresnapdragon_855_mobile_platformwcn6755_firmwareqca6430_firmwaresdx71m_firmwaresd_8_gen1_5gqca9377qdx1010sa6155snapdragon_x70_modem-rf_systemsnapdragon_x75_5g_modem-rf_systemsnapdragon_x75_5g_modem-rf_system_firmwareqcs5430_firmwareqcn6024snapdragon_8cx_gen_2_5g_compute_platform_\(sc8180xp-aa\)_firmwarecsra6640sa8155psnapdragon_8cx_gen_3_compute_platform_\(sc8280xp-ab\)_firmwareqru1062snapdragon_x62_5g_modem-rf_system_firmwareqdu1000wcn3990_firmwaresxr2250pqca6595ausa8620psxr1230p_firmwareqcm4290_firmwareqca9377_firmwaresnapdragon_670_mobile_platformqdu1110_firmwaresnapdragon_8cx_gen_3_compute_platform_\(sc8280xp-bb\)snapdragon_8c_compute_platform_\(sc8180xp-ad\)sa9000pwcn3980_firmwarevideo_collaboration_vc5_platform_firmwareqcs4490qru1052_firmwareqca6335snapdragon_8cx_compute_platform_\(sc8180xp-ac\)wsa8815qca6391wcd9370_firmwareqam8255pqfw7124qca6564ausnapdragon_765g_5g_mobile_platform_\(sm7250-ab\)qcn9011_firmwareqcs8550wcd9341sd865_5gsa8150pqcs2290wcd9340wcd9395snapdragon_xr2_5g_platformsm7325psa8530pqcn6224_firmwarerobotics_rb3_platformqca6797aq_firmwaresm8635_firmwaresnapdragon_662_mobile_platformsnapdragon_wear_1300_platform_firmwarewcd9375_firmwareqcn9011snapdragon_x50_5g_modem-rf_system_firmwarewcn3999_firmwaresrv1hqca6174a_firmwaretalynplus_firmwarewcd9385sa7775pfastconnect_6900_firmwaresg8275psnapdragon_888\+_5g_mobile_platform_\(sm8350-ac\)_firmwaresm4125snapdragon_auto_5g_modem-rf_gen_2_firmwareqca6436_firmwaresnapdragon_765_5g_mobile_platform_\(sm7250-aa\)_firmwaresnapdragon_8_gen_2_mobile_platform_firmwarevideo_collaboration_vc3_platform_firmwareqca8337_firmwaresrv1mwcd9326snapdragon_680_4g_mobile_platformqca9984_firmwareSnapdragonqam8255p_firmwareqca9377_firmwaresnapdragon_850_mobile_compute_platform_firmwaresnapdragon_662_mobile_platform_firmwaretalynplus_firmwaresxr2230p_firmwareqcs2290_firmwaresnapdragon_x24_lte_modem_firmwaresg8275p_firmwareqca6431_firmwareflight_rb5_5g_platform_firmwareqcn6224_firmwarewcn3950_firmwaresrv1l_firmwaresnapdragon_888_5g_mobile_platform_firmwaresa8150p_firmwarewcn6755_firmwareqca6420_firmwareqca6595au_firmwarecsra6620_firmwaresd_675_firmwaresd675_firmwarecsra6640_firmwareqcm5430_firmwaresnapdragon_460_mobile_platform_firmwaresnapdragon_480_5g_mobile_platform_firmwareqca6584au_firmwareqep8111_firmwareqrb5165n_firmwarewcn3990_firmwareqca9984_firmwarequalcomm_video_collaboration_vc3_platform_firmwaresd_8cx_firmwarewcd9385_firmwareqcn6024_firmwarewcd9326_firmwareqamsrv1h_firmwaresd_8_gen1_5g_firmwareqsm8350_firmwaresd460_firmwareqam8295p_firmwareqcn9011_firmwaresa9000p_firmwareqca6320_firmwaresm7315_firmwareqca6574au_firmwaresdx55_firmwaresdx71m_firmwaresnapdragon_695_5g_mobile_platform_firmwaresnapdragon_835_mobile_pc_platform_firmwareqca8081_firmwaresa6155_firmwarewcd9375_firmwaresm7250p_firmwarewcn3999_firmwarewsa8845h_firmwareqca6436_firmwaresnapdragon_680_4g_mobile_platform_firmwareqca6564au_firmwaresa8620p_firmwaresa6155p_firmwaresnapdragon_x65_5g_modem-rf_system_firmwareqcm8550_firmwareqca6678aq_firmwaresmart_audio_400_platform_firmwaresa8775p_firmwaresnapdragon_x70_modem-rf_system_firmwareqrb5165m_firmwarewsa8840_firmwaresa8155_firmwarerobotics_rb3_platform_firmwareqca4004_firmwareqcs8550_firmwaresc8380xp_firmwaresd662_firmwarevision_intelligence_300_platform_firmwarewcn3988_firmwareqru1062_firmwaresa6145p_firmwarewcd9306_firmwaresa7775p_firmwarefastconnect_6700_firmwarewsa8810_firmwaresnapdragon_ar2_gen_1_platform_firmwaresa8255p_firmwarewcd9395_firmwareqdu1000_firmwareqca6698aq_firmwareqca6174a_firmwareqcs4290_firmwaresa8770p_firmwaresnapdragon_auto_5g_modem-rf_gen_2_firmwareqam8775p_firmwaresnapdragon_wear_1300_platform_firmwaresxr2130_firmwareqca6696_firmwareqcs6490_firmwaresnapdragon_665_mobile_platform_firmwareqru1052_firmwarewcn3910_firmwaresnapdragon_855_mobile_platform_firmwareqcc710_firmwarevision_intelligence_400_platform_firmwarewsa8830_firmwaresd855_firmwaresd865_5g_firmwarewsa8815_firmwarewsa8835_firmwaresnapdragon_780g_5g_mobile_platform_firmwaresnapdragon_865_5g_mobile_platform_firmwarefastconnect_6800_firmwareqcn7606_firmwaresa8295p_firmwaresxr2250p_firmwaresnapdragon_8_gen_2_mobile_platform_firmwaresnapdragon_675_mobile_platform_firmwareqcm2290_firmwarerobotics_rb5_platform_firmwareqca8337_firmwarewcd9380_firmwaresm4635_firmwaresnapdragon_778g_5g_mobile_platform_firmwarewcd9378_firmwareqcs7230_firmwareqdu1010_firmwaresnapdragon_670_mobile_platform_firmwaresa8530p_firmwaresd670_firmwaresxr1230p_firmwareqdu1110_firmwaresa8540p_firmwaresnapdragon_x72_5g_modem-rf_system_firmwaresnapdragon_4_gen_1_mobile_platform_firmwaresnapdragon_4_gen_2_mobile_platform_firmwaressg2125p_firmwaresm8635_firmwareqca6310_firmwareqca6430_firmwareqcn9012_firmwareqfw7114_firmwaresm6370_firmwarewcd9335_firmwareqca6335_firmwareqca6574_firmwarewcd9340_firmwaresm4125_firmwaresm7325p_firmwaresdx57m_firmwareqru1032_firmwaresnapdragon_xr2_5g_platform_firmwarewsa8845_firmwareqca6426_firmwareqca6574a_firmwarefastconnect_6200_firmwaresnapdragon_x62_5g_modem-rf_system_firmwarewcn3980_firmwaresnapdragon_x55_5g_modem-rf_system_firmwaresnapdragon_x50_5g_modem-rf_system_firmwareqca6421_firmware9205_lte_modem_firmwareaqt1000_firmwarewcn6740_firmwareqcm4490_firmwaresnapdragon_845_mobile_platform_firmwaresnapdragon_x35_5g_modem-rf_system_firmwareqcn6274_firmwareqcs4490_firmwarear8031_firmwareqcm6490_firmwaresa8650p_firmwarewsa8832_firmwaresnapdragon_x75_5g_modem-rf_system_firmwarefastconnect_6900_firmwaresrv1h_firmwareqca6797aq_firmwaresa8155p_firmwareqdx1011_firmwareqca6564a_firmwareqcn9024_firmwaresa7255p_firmwareqcs8250_firmwarewcd9341_firmwarefastconnect_7800_firmwareqcm4290_firmwareqdx1010_firmwaresnapdragon_8_gen_1_mobile_platform_firmwareqamsrv1m_firmwaresrv1m_firmwaresd835_firmwareqam8650p_firmwareqca6595_firmwareqcs5430_firmwareqca6391_firmwarewcd9370_firmwaresm8550p_firmwarequalcomm_video_collaboration_vc5_platform_firmwaresd888_firmwaresnapdragon_8_gen_3_mobile_platform_firmwarewcd9390_firmwaresdx61_firmwaressg2115p_firmwareqam8620p_firmwareqfw7124_firmwareqdu1210_firmwarear8035_firmware
CWE ID-CWE-20
Improper Input Validation
CVE-2024-38303
Assigner-Dell
ShareView Details
Assigner-Dell
CVSS Score-5.3||MEDIUM
EPSS-0.03% / 8.43%
||
7 Day CHG~0.00%
Published-29 Aug, 2024 | 04:34
Updated-20 Dec, 2024 | 14:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Dell PowerEdge Platform, 14G Intel BIOS version(s) prior to 2.22.x, contains an Improper Input Validation vulnerability. A high privileged attacker with local access could potentially exploit this vulnerability, leading to Information disclosure.

Action-Not Available
Vendor-Dell Inc.
Product-emc_xc_core_xc740xd_systememc_xc_core_6420_systememc_xc_core_xcxr2poweredge_r440_firmwarepoweredge_m640_\(for_pe_vrtx\)_firmwarepoweredge_xe7420poweredge_mx740c_firmwarepoweredge_m640poweredge_r640_firmwarepoweredge_t440emc_xc_core_xc740xd2_firmwarepoweredge_r940xa_firmwareemc_storage_nx3240dss_8440poweredge_mx840cpoweredge_xe7440_firmwarepoweredge_mx740cpoweredge_t640emc_xc_core_xc640_systememc_storage_nx3340_firmwaredss_8440_firmwarepoweredge_r840_firmwarepoweredge_c4140_firmwarepoweredge_r940poweredge_r540poweredge_m640_\(for_pe_vrtx\)emc_storage_nx3240_firmwarepoweredge_m640_firmwareemc_xc_core_xc940_systempoweredge_mx840c_firmwarepoweredge_r540_firmwarepoweredge_r740xdpoweredge_r740_firmwarepoweredge_r440emc_xc_core_xc940_system_firmwarepoweredge_r740xd2_firmwarepoweredge_xr2_firmwarepoweredge_xe2420poweredge_r940xapoweredge_xe7440poweredge_c6420emc_xc_core_xc740xd_system_firmwarepoweredge_fc640_firmwareemc_storage_nx3340emc_xc_core_6420_system_firmwarepoweredge_xe7420_firmwarepoweredge_t640_firmwarepoweredge_c6420_firmwarepoweredge_r840poweredge_r740xd2poweredge_r640poweredge_fc640poweredge_xe2420_firmwareemc_xc_core_xc640_system_firmwarepoweredge_c4140emc_xc_core_xcxr2_firmwarepoweredge_t440_firmwarepoweredge_r940_firmwarepoweredge_r740xd_firmwareemc_xc_core_xc740xd2poweredge_r740poweredge_xr2PowerEdge Platform
CWE ID-CWE-20
Improper Input Validation
CVE-2024-45058
Assigner-GitHub, Inc.
ShareView Details
Assigner-GitHub, Inc.
CVSS Score-8.1||HIGH
EPSS-24.30% / 96.00%
||
7 Day CHG~0.00%
Published-28 Aug, 2024 | 20:17
Updated-13 Sep, 2024 | 20:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Privilege escalation in i-Educar

i-Educar is free, fully online school management software that can be used by school secretaries, teachers, coordinators, and area managers. Prior to the 2.9 branch, an attacker with only minimal viewing privileges in the settings section is able to change their user type to Administrator (or another type with super-permissions) through a specifically crafted POST request to `/intranet/educar_usuario_cad.php`, modifying the `nivel_usuario_` parameter. The vulnerability occurs in the file located at `ieducar/intranet/educar_usuario_cad.php`, which does not check the user's current permission level before allowing changes. Commit c25910cdf11ab50e50162a49dd44bef544422b6e contains a patch for the issue.

Action-Not Available
Vendor-portabilisportabilisportabilis
Product-i-educari-educari-educar
CWE ID-CWE-269
Improper Privilege Management
CWE ID-CWE-20
Improper Input Validation
CWE ID-CWE-862
Missing Authorization
CVE-2021-38122
Assigner-OpenText (formerly Micro Focus)
ShareView Details
Assigner-OpenText (formerly Micro Focus)
CVSS Score-6.2||MEDIUM
EPSS-0.19% / 41.32%
||
7 Day CHG~0.00%
Published-28 Aug, 2024 | 06:28
Updated-13 Sep, 2024 | 18:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cross-Site Scripting (XSS) in Advance Authentication

A Cross-Site Scripting vulnerable identified in NetIQ Advance Authentication that impacts the server functionality and disclose sensitive information. This issue affects NetIQ Advance Authentication before 6.3.5.1

Action-Not Available
Vendor-Micro Focus International LimitedOpen Text Corporation
Product-netiq_advanced_authenticationNetIQ Advance Authentication
CWE ID-CWE-20
Improper Input Validation
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2024-41565
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-4.3||MEDIUM
EPSS-0.12% / 31.63%
||
7 Day CHG~0.00%
Published-28 Aug, 2024 | 00:00
Updated-19 Mar, 2025 | 15:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

JustEnoughItems (JEI) 19.5.0.33 and before contains an Improper Validation of Specified Index, Position, or Offset in Input vulnerability. The specific issue is a failure to validate slot index in JEI for Minecraft, which allows in-game item duplication.

Action-Not Available
Vendor-mezzn/a
Product-justenoughitemsn/a
CWE ID-CWE-129
Improper Validation of Array Index
CWE ID-CWE-20
Improper Input Validation
CVE-2024-7988
Assigner-Rockwell Automation
ShareView Details
Assigner-Rockwell Automation
CVSS Score-9.3||CRITICAL
EPSS-12.48% / 93.81%
||
7 Day CHG~0.00%
Published-26 Aug, 2024 | 14:47
Updated-21 Oct, 2025 | 18:58
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
ThinManager® ThinServer™ Information Disclosure and Remote Code Execution Vulnerabilities

A remote code execution vulnerability exists in the Rockwell Automation ThinManager® ThinServer™ that allows a threat actor to execute arbitrary code with System privileges. This vulnerability exists due to the lack of proper data input validation, which allows files to be overwritten.

Action-Not Available
Vendor-Rockwell Automation, Inc.
Product-thinmanager_thinserverThinManager® ThinServer™thinmanager_thinserver
CWE ID-CWE-20
Improper Input Validation
CVE-2024-8073
Assigner-Hillstone Networks Inc.
ShareView Details
Assigner-Hillstone Networks Inc.
CVSS Score-9.8||CRITICAL
EPSS-1.27% / 79.30%
||
7 Day CHG~0.00%
Published-26 Aug, 2024 | 02:19
Updated-12 Sep, 2024 | 20:58
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Command Injection Vulnerability in Hillstone Networks Web Application Firewall

Improper Input Validation vulnerability in Hillstone Networks Hillstone Networks Web Application Firewall on 5.5R6 allows Command Injection.This issue affects Hillstone Networks Web Application Firewall: from 5.5R6-2.6.7 through 5.5R6-2.8.13.

Action-Not Available
Vendor-hillstonenetHillstone Networkshillstonenet
Product-web_application_firewallHillstone Networks Web Application Firewallweb_application_firewall
CWE ID-CWE-20
Improper Input Validation
CWE ID-CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')
CVE-2024-45258
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.14% / 34.32%
||
7 Day CHG~0.00%
Published-25 Aug, 2024 | 00:00
Updated-26 Aug, 2024 | 14:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The req package before 3.43.4 for Go may send an unintended request when a malformed URL is provided, because cleanHost in http.go intentionally uses a "garbage in, garbage out" design.

Action-Not Available
Vendor-n/aimroc
Product-n/areq
CWE ID-CWE-20
Improper Input Validation
CVE-2024-45236
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.19% / 40.65%
||
7 Day CHG~0.00%
Published-24 Aug, 2024 | 00:00
Updated-03 Nov, 2025 | 21:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in Fort before 1.6.3. A malicious RPKI repository that descends from a (trusted) Trust Anchor can serve (via rsync or RRDP) a signed object containing an empty signedAttributes field. Fort accesses the set's elements without sanitizing it first. Because Fort is an RPKI Relying Party, a crash can lead to Route Origin Validation unavailability, which can lead to compromised routing.

Action-Not Available
Vendor-nicmxn/afort_validator_project
Product-fort-validatorn/afort_validator
CWE ID-CWE-20
Improper Input Validation
CVE-2024-41849
Assigner-Adobe Systems Incorporated
ShareView Details
Assigner-Adobe Systems Incorporated
CVSS Score-4.1||MEDIUM
EPSS-0.21% / 43.26%
||
7 Day CHG~0.00%
Published-23 Aug, 2024 | 16:53
Updated-07 Oct, 2024 | 13:59
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Adobe Experience Manager | Improper Input Validation (CWE-20)

Adobe Experience Manager versions 6.5.20 and earlier are affected by an Improper Input Validation vulnerability that could lead to a security feature bypass. An low-privileged attacker could leverage this vulnerability to slightly affect the integrity of the page. Exploitation of this issue requires user interaction and scope is changed.

Action-Not Available
Vendor-Adobe Inc.
Product-experience_managerAdobe Experience Manager
CWE ID-CWE-20
Improper Input Validation
CVE-2024-42531
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.22% / 45.07%
||
7 Day CHG~0.00%
Published-23 Aug, 2024 | 00:00
Updated-29 Aug, 2024 | 13:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Ezviz Internet PT Camera CS-CV246 D15655150 allows an unauthenticated host to access its live video stream by crafting a set of RTSP packets with a specific set of URLs that can be used to redirect the camera feed. NOTE: the vendor's perspective is that the Anonymous120386 sample code can establish RTSP protocol communictaion, but cannot obtain video or audio data; thus, there is no risk.

Action-Not Available
Vendor-n/aezviz
Product-n/acs-cv246_firmware
CWE ID-CWE-20
Improper Input Validation
CVE-2024-45167
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-3.99% / 88.24%
||
7 Day CHG~0.00%
Published-22 Aug, 2024 | 00:00
Updated-03 Sep, 2025 | 19:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in UCI IDOL 2 (aka uciIDOL or IDOL2) through 2.12. Due to improper input validation, improper deserialization, and improper restriction of operations within the bounds of a memory buffer, IDOL2 is vulnerable to Denial-of-Service (DoS) attacks and possibly remote code execution. A certain XmlMessage document causes 100% CPU consumption.

Action-Not Available
Vendor-ucin/auci
Product-idol2n/aidol_2
CWE ID-CWE-20
Improper Input Validation
CVE-2024-45169
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-2.76% / 85.83%
||
7 Day CHG+0.21%
Published-22 Aug, 2024 | 00:00
Updated-04 Sep, 2025 | 10:57
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in UCI IDOL 2 (aka uciIDOL or IDOL2) through 2.12. Due to improper input validation, improper deserialization, and improper restriction of operations within the bounds of a memory buffer, IDOL2 is vulnerable to Denial-of-Service (DoS) attacks and possibly remote code execution via the \xB0\x00\x3c byte sequence.

Action-Not Available
Vendor-ucin/auci
Product-idol2n/aidol_2
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE ID-CWE-20
Improper Input Validation
CVE-2024-7980
Assigner-Chrome
ShareView Details
Assigner-Chrome
CVSS Score-7.3||HIGH
EPSS-0.02% / 5.60%
||
7 Day CHG~0.00%
Published-21 Aug, 2024 | 20:20
Updated-26 Aug, 2024 | 15:14
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insufficient data validation in Installer in Google Chrome on Windows prior to 128.0.6613.84 allowed a local attacker to perform privilege escalation via a crafted symbolic link. (Chromium security severity: Medium)

Action-Not Available
Vendor-Google LLCMicrosoft Corporation
Product-chromewindowsChromechrome
CWE ID-CWE-20
Improper Input Validation
CWE ID-CWE-345
Insufficient Verification of Data Authenticity
CVE-2024-7977
Assigner-Chrome
ShareView Details
Assigner-Chrome
CVSS Score-7.8||HIGH
EPSS-0.03% / 7.62%
||
7 Day CHG~0.00%
Published-21 Aug, 2024 | 20:20
Updated-22 Aug, 2024 | 20:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insufficient data validation in Installer in Google Chrome on Windows prior to 128.0.6613.84 allowed a local attacker to perform privilege escalation via a malicious file. (Chromium security severity: Medium)

Action-Not Available
Vendor-Google LLCMicrosoft Corporation
Product-chromewindowsChromechrome
CWE ID-CWE-20
Improper Input Validation
CVE-2024-7974
Assigner-Chrome
ShareView Details
Assigner-Chrome
CVSS Score-8.8||HIGH
EPSS-0.69% / 71.66%
||
7 Day CHG~0.00%
Published-21 Aug, 2024 | 20:20
Updated-19 Mar, 2025 | 17:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insufficient data validation in V8 API in Google Chrome prior to 128.0.6613.84 allowed a remote attacker to potentially exploit heap corruption via a crafted Chrome Extension. (Chromium security severity: Medium)

Action-Not Available
Vendor-Google LLC
Product-chromeChrome
CWE ID-CWE-20
Improper Input Validation
CVE-2024-33657
Assigner-AMI
ShareView Details
Assigner-AMI
CVSS Score-7.8||HIGH
EPSS-0.17% / 37.90%
||
7 Day CHG~0.00%
Published-21 Aug, 2024 | 16:17
Updated-12 Jan, 2026 | 15:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Smm Callout in SmmComputrace Module

This SMM vulnerability affects certain modules, allowing privileged attackers to execute arbitrary code, manipulate stack memory, and leak information from SMRAM to kernel space, potentially leading to denial-of-service attacks.

Action-Not Available
Vendor-AMI
Product-aptio_vAptioVaptio_v
CWE ID-CWE-20
Improper Input Validation
CVE-2020-11850
Assigner-OpenText (formerly Micro Focus)
ShareView Details
Assigner-OpenText (formerly Micro Focus)
CVSS Score-7.3||HIGH
EPSS-0.18% / 39.53%
||
7 Day CHG~0.00%
Published-21 Aug, 2024 | 12:52
Updated-23 Aug, 2024 | 17:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cross site scripting vulnerability in Self Service Password Reset

Improper Input Validation vulnerability in OpenText Self Service Password Reset allows Cross-Site Scripting (XSS). This issue affects Self Service Password Reset before 4.5.0.2 and 4.4.0.6

Action-Not Available
Vendor-Micro Focus International LimitedOpen Text Corporation
Product-netiq_self_service_password_resetSelf Service Password Resetself_service_password_reset
CWE ID-CWE-20
Improper Input Validation
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2024-25009
Assigner-Ericsson
ShareView Details
Assigner-Ericsson
CVSS Score-6.5||MEDIUM
EPSS-0.10% / 26.96%
||
7 Day CHG~0.00%
Published-20 Aug, 2024 | 12:00
Updated-20 Aug, 2024 | 15:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Ericsson Packet Core Controller (PCC) - Improper Input Validation Vulnerability

Ericsson Packet Core Controller (PCC) contains a vulnerability in Access and Mobility Management Function (AMF) where improper input validation can lead to denial of service which may result in service degradation.

Action-Not Available
Vendor-Ericsson
Product-Packet Core Controller
CWE ID-CWE-20
Improper Input Validation
CVE-2024-7646
Assigner-Kubernetes
ShareView Details
Assigner-Kubernetes
CVSS Score-8.8||HIGH
EPSS-21.65% / 95.65%
||
7 Day CHG-4.11%
Published-16 Aug, 2024 | 17:36
Updated-19 Aug, 2024 | 18:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A security issue was discovered in ingress-nginx where an actor with permission to create Ingress objects (in the `networking.k8s.io` or `extensions` API group) can bypass annotation validation to inject arbitrary commands and obtain the credentials of the ingress-nginx controller. In the default configuration, that credential has access to all secrets in the cluster.

Action-Not Available
Vendor-Kubernetes
Product-ingress-nginxingress-nginx
CWE ID-CWE-20
Improper Input Validation
CVE-2024-25008
Assigner-Ericsson
ShareView Details
Assigner-Ericsson
CVSS Score-6.8||MEDIUM
EPSS-0.05% / 15.36%
||
7 Day CHG~0.00%
Published-16 Aug, 2024 | 09:42
Updated-19 Aug, 2024 | 13:00
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Ericsson RAN Compute and Site Controller 6610 - Improper Input Validation Vulnerability

Ericsson RAN Compute and Site Controller 6610 contains a vulnerability in the Control System where Improper Input Validation can lead to arbitrary code execution, for example to obtain a Linux Shell with the same privileges as the attacker. The attacker would require elevated privileges for example a valid OAM user having the system administrator role to exploit the vulnerability.

Action-Not Available
Vendor-Ericsson
Product-Ericsson RAN Compute Basebands (all BB variants)Site Controller 6610ran_computecontroller_6610
CWE ID-CWE-20
Improper Input Validation
CVE-2024-43373
Assigner-GitHub, Inc.
ShareView Details
Assigner-GitHub, Inc.
CVSS Score-7.7||HIGH
EPSS-0.21% / 43.26%
||
7 Day CHG~0.00%
Published-15 Aug, 2024 | 14:31
Updated-16 Aug, 2024 | 21:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
webcrack has an Arbitrary File Write Vulnerability on Windows when Parsing and Saving a Malicious Bundle

webcrack is a tool for reverse engineering javascript. An arbitrary file write vulnerability exists in the webcrack module when processing specifically crafted malicious code on Windows systems. This vulnerability is triggered when using the unpack bundles feature in conjunction with the saving feature. If a module name includes a path traversal sequence with Windows path separators, an attacker can exploit this to overwrite files on the host system. This vulnerability allows an attacker to write arbitrary `.js` files to the host system, which can be leveraged to hijack legitimate Node.js modules to gain arbitrary code execution. This vulnerability has been patched in version 2.14.1.

Action-Not Available
Vendor-j4k0xbj4k0xbj4k0xbMicrosoft Corporation
Product-windowswebcrackwebcrackwebcrack
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CWE ID-CWE-20
Improper Input Validation
CVE-2024-7515
Assigner-Rockwell Automation
ShareView Details
Assigner-Rockwell Automation
CVSS Score-8.7||HIGH
EPSS-0.16% / 37.26%
||
7 Day CHG+0.01%
Published-14 Aug, 2024 | 19:40
Updated-04 Mar, 2025 | 17:11
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Rockwell Automation ControlLogix/GuardLogix 5580 and CompactLogix/Compact GuardLogix® 5380 Controller Denial-of-Service Vulnerability via Input Validation

CVE-2024-7515 IMPACT A denial-of-service vulnerability exists in the affected products. A malformed PTP management packet can cause a major nonrecoverable fault in the controller.

Action-Not Available
Vendor-Rockwell Automation, Inc.
Product-compactlogix_5480compactlogix_5380controllogix_5580_firmwarecontrollogix_5580compact_guardlogix_5380_sil_3_firmwarecompact_guardlogix_5380_sil_3compactlogix_5380_firmwarecompact_guardlogix_5380_sil_2_firmwareguardlogix_5580_firmwarecompactlogix_5480_firmwareguardlogix_5580compact_guardlogix_5380_sil_2Compact GuardLogix 5380 (5069 – L3zS2)CompactLogix 5480 (5069-L4)ControlLogix® 5580 (1756- L8z)GuardLogix 5580 (1756- L8zS)CompactLogix 5380 (5069-L3z)controllogix_5580_firmwarecompactlogix_5480_firmwarecompactlogix_5380_firmwareguardlogix_5580_firmwarecompact_guardlogix_5380_firmware
CWE ID-CWE-20
Improper Input Validation
CVE-2024-7507
Assigner-Rockwell Automation
ShareView Details
Assigner-Rockwell Automation
CVSS Score-8.7||HIGH
EPSS-0.07% / 21.22%
||
7 Day CHG~0.00%
Published-14 Aug, 2024 | 19:35
Updated-04 Mar, 2025 | 17:11
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Rockwell Automation ControlLogix/GuardLogix 5580 and CompactLogix/Compact GuardLogix® 5380 Controller Denial-of-Service Vulnerability via Input Validation

CVE-2024-7507 IMPACT A denial-of-service vulnerability exists in the affected products. This vulnerability occurs when a malformed PCCC message is received, causing a fault in the controller.

Action-Not Available
Vendor-Rockwell Automation, Inc.
Product-compactlogix_5480compactlogix_5380controllogix_5580_firmwarecontrollogix_5580compact_guardlogix_5380_sil_3_firmwarecompact_guardlogix_5380_sil_3compactlogix_5380_firmwarecompact_guardlogix_5380_sil_2_firmwareguardlogix_5580_firmwarecompactlogix_5480_firmwareguardlogix_5580compact_guardlogix_5380_sil_2CompactLogix 5380 (5069 – L3z)CompactLogix 5480 (5069-L4)Compact GuardLogix 5380 (5069- L3zS2)GuardLogix 5580 (1756-L8z)ControlLogix® 5580 (1756 –L8z)controllogix_5580_firmwarecompactlogix_5480_firmwareguardlogix_5580_firmwarecontrollogix_5380_firmwarecompact_guardlogix_5380_firmware
CWE ID-CWE-20
Improper Input Validation
CVE-2024-34118
Assigner-Adobe Systems Incorporated
ShareView Details
Assigner-Adobe Systems Incorporated
CVSS Score-5.5||MEDIUM
EPSS-0.06% / 17.23%
||
7 Day CHG~0.00%
Published-14 Aug, 2024 | 14:56
Updated-15 Aug, 2024 | 16:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Adobe illustrator 2024 TIF File parsing Division by zero denial of service

Illustrator versions 28.5, 27.9.4 and earlier are affected by an Improper Input Validation vulnerability that could lead to an application denial-of-service condition. An attacker could exploit this vulnerability to render the application unresponsive or terminate its execution. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

Action-Not Available
Vendor-Apple Inc.Microsoft CorporationAdobe Inc.
Product-windowsmacosillustratorIllustratorillustrator
CWE ID-CWE-20
Improper Input Validation
CVE-2024-41856
Assigner-Adobe Systems Incorporated
ShareView Details
Assigner-Adobe Systems Incorporated
CVSS Score-7.8||HIGH
EPSS-0.09% / 25.22%
||
7 Day CHG~0.00%
Published-14 Aug, 2024 | 14:56
Updated-13 Sep, 2024 | 09:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Illustrator | Improper Input Validation (CWE-20)

Illustrator versions 28.5, 27.9.4, 28.6, 27.9.5 and earlier are affected by an Improper Input Validation vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

Action-Not Available
Vendor-Apple Inc.Microsoft CorporationAdobe Inc.
Product-windowsmacosillustratorIllustratorillustrator
CWE ID-CWE-20
Improper Input Validation
CVE-2024-21810
Assigner-Intel Corporation
ShareView Details
Assigner-Intel Corporation
CVSS Score-9.3||CRITICAL
EPSS-0.12% / 31.80%
||
7 Day CHG~0.00%
Published-14 Aug, 2024 | 13:45
Updated-16 Aug, 2024 | 04:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper input validation in the Linux kernel mode driver for some Intel(R) Ethernet Network Controllers and Adapters before version 28.3 may allow an authenticated user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-Intel(R) Ethernet Network Controllers and Adaptersethernet_complete_driver_pack
CWE ID-CWE-20
Improper Input Validation
CVE-2023-34424
Assigner-Intel Corporation
ShareView Details
Assigner-Intel Corporation
CVSS Score-6.7||MEDIUM
EPSS-0.05% / 16.59%
||
7 Day CHG~0.00%
Published-14 Aug, 2024 | 13:45
Updated-03 Nov, 2025 | 22:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper input validation in firmware for some Intel(R) CSME may allow a privileged user to potentially enable denial of service via local access.

Action-Not Available
Vendor-n/a
Product-Intel(R) CSME
CWE ID-CWE-20
Improper Input Validation
CVE-2024-34163
Assigner-Intel Corporation
ShareView Details
Assigner-Intel Corporation
CVSS Score-8.7||HIGH
EPSS-0.09% / 25.90%
||
7 Day CHG~0.00%
Published-14 Aug, 2024 | 13:45
Updated-12 Sep, 2024 | 18:59
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper input validation in firmware for some Intel(R) NUC may allow a privileged user to potentially enableescalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-nuc_x15_laptop_kit_laprc510nuc_x15_laptop_kit_lapbc710_firmwarenuc_x15_laptop_kit_lapbc510_firmwarenuc_x15_laptop_kit_lapbc710nuc_x15_laptop_kit_lapkc51e_firmwarenuc_x15_laptop_kit_laprc710_firmwarenuc_x15_laptop_kit_lapac71hnuc_x15_laptop_kit_lapkc51enuc_x15_laptop_kit_laprc710nuc_x15_laptop_kit_lapac71gnuc_x15_laptop_kit_lapbc510nuc_x15_laptop_kit_lapkc71f_firmwarenuc_x15_laptop_kit_lapac71g_firmwarenuc_x15_laptop_kit_laprc510_firmwarenuc_x15_laptop_kit_lapac71h_firmwarenuc_x15_laptop_kit_lapkc71e_firmwarenuc_x15_laptop_kit_lapkc71fnuc_x15_laptop_kit_lapkc71eIntel(R) NUClapkc71f_firmwarelapbc710_firmwarelapkc51e_firmwarelapkc71e_firmwarelaprc510_firmwarelaprc710_firmwarelapbc510_firmwarelapac71h_firmwarelapac71g_firmware
CWE ID-CWE-20
Improper Input Validation
CVE-2024-24973
Assigner-Intel Corporation
ShareView Details
Assigner-Intel Corporation
CVSS Score-1||LOW
EPSS-0.05% / 15.41%
||
7 Day CHG~0.00%
Published-14 Aug, 2024 | 13:45
Updated-31 Aug, 2024 | 03:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper input validation for some Intel(R) Distribution for GDB software before version 2024.0.1 may allow an authenticated user to potentially enable denial of service via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-oneapi_base_toolkitdistribution_for_gdbIntel(R) Distribution for GDB software
CWE ID-CWE-20
Improper Input Validation
CVE-2024-28947
Assigner-Intel Corporation
ShareView Details
Assigner-Intel Corporation
CVSS Score-7.1||HIGH
EPSS-0.09% / 25.23%
||
7 Day CHG~0.00%
Published-14 Aug, 2024 | 13:45
Updated-12 Sep, 2024 | 18:52
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper input validation in kernel mode driver for some Intel(R) Server Board S2600ST Family firmware before version 02.01.0017 may allow a privileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-server_board_s2600st_firmwareIntel(R) Server Board S2600ST Family firmwareserver_board_s2600st_firmware
CWE ID-CWE-20
Improper Input Validation
CVE-2024-38483
Assigner-Dell
ShareView Details
Assigner-Dell
CVSS Score-5.8||MEDIUM
EPSS-0.04% / 11.51%
||
7 Day CHG~0.00%
Published-14 Aug, 2024 | 09:24
Updated-18 Sep, 2024 | 19:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Dell BIOS contains an Improper Input Validation vulnerability in an externally developed component. A high privileged attacker with local access could potentially exploit this vulnerability, leading to Code execution.

Action-Not Available
Vendor-Dell Inc.
Product-latitude_5480latitude_7280_firmwarelatitude_5280latitude_5420_rugged_firmwarelatitude_7212_rugged_extreme_tabletlatitude_5414_rugged_firmwarelatitude_5424_rugged_firmwarewyse_7040_thin_client_firmwarelatitude_5420_ruggedoptiplex_7450_all-in-one_firmwarelatitude_7414_rugged_firmwarelatitude_5480_firmwarelatitude_7380_firmwarelatitude_7390_2-in-1_firmwarelatitude_7480_firmwarelatitude_5400_firmwarewyse_7040_thin_clientlatitude_5288_firmwarelatitude_3390_2-in-1precision_3420latitude_5490latitude_5590latitude_7390_2-in-1precision_5530_2-in-1precision_5530_2-in-1_firmwareprecision_3420_tower_firmwarelatitude_5290_2-in-1_firmwarelatitude_5488latitude_5490_firmwareprecision_7720latitude_7380optiplex_7450_all-in-oneprecision_5520_firmwarelatitude_5280_firmwarelatitude_12_rugged_extreme_7214_firmwarelatitude_7424_rugged_extreme_firmwarelatitude_12_rugged_extreme_7214optiplex_5050optiplex_3050_firmwarelatitude_3300latitude_5580precision_7520latitude_5290_2-in-1latitude_3390_2-in-1_firmwareprecision_3620_towerlatitude_7285_2-in-1latitude_7414_ruggedprecision_7720_firmwarelatitude_7290precision_3520_firmwarelatitude_7212_rugged_extreme_tablet_firmwarelatitude_13_3380_firmwarelatitude_7490_firmwarelatitude_7480latitude_7285_2-in-1_firmwarelatitude_7390_firmwarelatitude_5290latitude_7424_rugged_extremeprecision_5520latitude_5290_firmwarelatitude_5414_ruggedlatitude_5590_firmwarelatitude_7390precision_3520latitude_7290_firmwarelatitude_5580_firmwarelatitude_5424_ruggedoptiplex_5050_firmwareprecision_7520_firmwareoptiplex_3050optiplex_3050_all-in-onelatitude_13_3380embedded_box_pc_5000_firmwareprecision_3620_firmwareembedded_box_pc_5000latitude_7490latitude_5288optiplex_3050_all-in-one_firmwarelatitude_3300_firmwarelatitude_7280latitude_5488_firmwarelatitude_5400Dell Client Platform BIOSwyse_7040_thin_client_firmwareprecision_3420_tower_firmwareprecision_3620_tower_firmwarelatitude_5290_2-in-1_firmware
CWE ID-CWE-20
Improper Input Validation
  • Previous
  • 1
  • 2
  • ...
  • 21
  • 22
  • 23
  • ...
  • 237
  • 238
  • Next