CVE |
Vendors |
Products |
Updated |
CVSS v3.1 |
Memory corruption while processing user buffers. |
Memory corruption while processing an escape call. |
Memory corruption while processing control commands in the virtual memory management interface. |
Transient DOS may occur when multi-profile concurrency arises with QHS enabled. |
memory corruption while processing an image encoding completion event. |
Memory corruption while processing IOCTL call to get the mapping. |
Memory corruption while processing escape commands from userspace. |
Memory corruption while performing SCM call with malformed inputs. |
Memory corruption while performing SCM call. |
Memory corruption while processing a malformed license file during reboot. |
Memory corruption during PlayReady APP usecase while processing TA commands. |
Transient DOS while processing IOCTL call for image encoding. |
Memory corruption while processing camera platform driver IOCTL calls. |
Information disclosure while processing batch command execution in Video driver. |
Transient DOS while processing video packets received from video firmware. |
Information disclosure may occur while processing the hypervisor log. |
Memory corruption may occur while processing IOCTL call for DMM/WARPNCC CONFIG request. |
A weakness has been identified in code-projects Online Complaint Site 1.0. Affected is an unknown function of the file /cms/admin/state.php. This manipulation of the argument state causes sql injection. The attack is possible to be carried out remotely. The exploit has been made available to the public and could be exploited. |
Grafana is an open-source platform for monitoring and observability. Grafana versions 8.0.0-beta1 through 8.3.0 (except for patched versions) iss vulnerable to directory traversal, allowing access to local files. The vulnerable URL path is: `<grafana_host_url>/public/plugins//`, where is the plugin ID for any installed plugin. At no time has Grafana Cloud been vulnerable. Users are advised to upgrade to patched versions 8.0.7, 8.1.8, 8.2.7, or 8.3.1. The GitHub Security Advisory contains more information about vulnerable URL paths, mitigation, and the disclosure timeline. |
A security flaw has been discovered in ChurchCRM up to 5.18.0. This impacts the function AuthMiddleware of the file src/ChurchCRM/Slim/Middleware/AuthMiddleware.php of the component API Endpoint. The manipulation results in missing authentication. The attack can be executed remotely. The exploit has been released to the public and may be exploited. The patch is identified as 3a1cffd2aea63d884025949cfbcfd274d06216a4. A patch should be applied to remediate this issue. |