CVE |
Vendors |
Products |
Updated |
CVSS v3.1 |
Denial of service (DoS) vulnerability in the office service. Successful exploitation of this vulnerability may affect availability. |
Denial of service (DoS) vulnerability in the office service. Successful exploitation of this vulnerability may affect availability. |
Denial of service (DoS) vulnerability in the office service. Successful exploitation of this vulnerability may affect availability. |
Denial of service (DoS) vulnerability in the office service. Successful exploitation of this vulnerability may affect availability. |
Buffer overflow vulnerability in the development framework module. Successful exploitation of this vulnerability may affect availability. |
Buffer overflow vulnerability in the sensor service. Successful exploitation of this vulnerability may affect availability. |
Data processing error vulnerability in the package management module. Successful exploitation of this vulnerability may affect availability. |
Use After Free (UAF) vulnerability in the storage management module. Successful exploitation of this vulnerability may affect availability. |
Vulnerability of improper exception handling in the print module. Successful exploitation of this vulnerability may affect availability. |
Vulnerability of improper exception handling in the print module. Successful exploitation of this vulnerability may affect availability. |
Buffer overflow vulnerability in the device management module. Successful exploitation of this vulnerability may affect availability. |
Buffer overflow vulnerability in the device management module. Successful exploitation of this vulnerability may affect availability. |
In wlan AP driver, there is a possible out of bounds write due to an integer overflow. This could lead to remote (proximal/adjacent) escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00418785; Issue ID: MSV-3515. |
In wlan AP driver, there is a possible out of bounds write due to an incorrect bounds check. This could lead to remote (proximal/adjacent) escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00422399; Issue ID: MSV-3748. |
In wlan AP driver, there is a possible out of bounds write due to an incorrect bounds check. This could lead to remote (proximal/adjacent) escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00422323; Issue ID: MSV-3810. |
In wlan AP driver, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: WCNCR00432661; Issue ID: MSV-3904. |
A flaw has been found in itsourcecode Online Examination System 1.0. Affected by this issue is some unknown functionality of the file /index.php. This manipulation of the argument Username causes sql injection. It is possible to initiate the attack remotely. The exploit has been published and may be used. |
Mattermost Desktop App versions <=5.13.0 fail to manage modals in the Mattermost Desktop App that stops a user with a server that uses basic authentication from accessing their server which allows an attacker that provides a malicious server to the user to deny use of the Desktop App via having the user configure the malicious server and forcing a modal popup that cannot be closed. |
A vulnerability was determined in MiczFlor RPi-Jukebox-RFID up to 2.8.0. This affects an unknown part of the file /htdocs/cardRegisterNew.php. Executing manipulation can lead to cross site scripting. The attack can be executed remotely. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way. |
in OpenHarmony v4.1.2 and prior versions allow a local attacker cause DOS through use after free. |