Search Results (336600 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2023-50943 1 Apache 1 Airflow 2025-05-30 7.5 High
Apache Airflow, versions before 2.8.1, have a vulnerability that allows a potential attacker to poison the XCom data by bypassing the protection of "enable_xcom_pickling=False" configuration setting resulting in poisoned data after XCom deserialization. This vulnerability is considered low since it requires a DAG author to exploit it. Users are recommended to upgrade to version 2.8.1 or later, which fixes this issue.
CVE-2023-50693 1 Jester Project 1 Jester 2025-05-30 9.8 Critical
An issue in Jester v.0.6.0 and before allows a remote attacker to send a malicious crafted request.
CVE-2023-50274 1 Hp 1 Oneview 2025-05-30 7.8 High
HPE OneView may allow command injection with local privilege escalation.
CVE-2023-47352 1 Technicolor 2 Tc8715d, Tc8715d Firmware 2025-05-30 8.8 High
Technicolor TC8715D devices have predictable default WPA2 security passwords. An attacker who scans for SSID and BSSID values may be able to predict these passwords.
CVE-2023-47200 1 Trendmicro 1 Apex One 2025-05-30 7.8 High
A plug-in manager origin validation vulnerability in the Trend Micro Apex One security agent could allow a local attacker to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. This vulnerability is similar to, but not identical to, CVE-2023-47201.
CVE-2023-47199 1 Trendmicro 1 Apex One 2025-05-30 7.8 High
An origin validation vulnerability in the Trend Micro Apex One security agent could allow a local attacker to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. This vulnerability is similar to, but not identical to, CVE-2023-47193.
CVE-2023-47194 1 Trendmicro 1 Apex One 2025-05-30 7.8 High
An origin validation vulnerability in the Trend Micro Apex One security agent could allow a local attacker to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. This vulnerability is similar to, but not identical to, CVE-2023-47195.
CVE-2023-47035 1 Etherscan 1 Reptilian Coin 2025-05-30 7.5 High
RPTC 0x3b08c was discovered to not conduct status checks on the parameter tradingOpen. This vulnerability can allow attackers to conduct unauthorized transfer operations.
CVE-2023-47033 1 Multisigwallet Project 1 Multisigwallet 2025-05-30 7.5 High
MultiSigWallet 0xF0C99 was discovered to contain a reentrancy vulnerability via the function executeTransaction.
CVE-2023-45889 1 Classlink 1 Oneclick 2025-05-30 6.1 Medium
A Universal Cross Site Scripting (UXSS) vulnerability in ClassLink OneClick Extension through 10.8 allows remote attackers to inject JavaScript into any webpage. NOTE: this issue exists because of an incomplete fix for CVE-2022-48612.
CVE-2023-44001 1 Linecorp 1 Line 2025-05-30 5.4 Medium
An issue in Ailand clinic mini-app on Line v13.6.1 allows attackers to send crafted malicious notifications via leakage of the channel access token.
CVE-2023-43991 1 Linecorp 1 Line 2025-05-30 5.4 Medium
An issue in PRIMA CLINIC mini-app on Line v13.6.1 allows attackers to send crafted malicious notifications via leakage of the channel access token.
CVE-2023-43990 1 Linecorp 1 Line 2025-05-30 5.4 Medium
An issue in cherub-hair mini-app on Line v13.6.1 allows attackers to send crafted malicious notifications via leakage of the channel access token.
CVE-2023-42143 1 Shelly 2 Trv, Trv Firmware 2025-05-30 5.4 Medium
Missing Integrity Check in Shelly TRV 20220811-152343/v2.1.8@5afc928c allows malicious users to create a backdoor by redirecting the device to an attacker-controlled machine which serves the manipulated firmware file. The device is updated with the manipulated firmware.
CVE-2023-41177 1 Trendmicro 1 Mobile Security 2025-05-30 6.1 Medium
Reflected cross-site scripting (XSS) vulnerabilities in Trend Micro Mobile Security (Enterprise) could allow an exploit against an authenticated victim that visits a malicious link provided by an attacker. Please note, this vulnerability is similar to, but not identical to, CVE-2023-41178.
CVE-2023-35835 1 Solax 2 Pocket Wifi 3, Pocket Wifi 3 Firmware 2025-05-30 9.8 Critical
An issue was discovered in SolaX Pocket WiFi 3 through 3.001.02. The device provides a WiFi access point for initial configuration. The WiFi network provided has no network authentication (such as an encryption key) and persists permanently, including after enrollment and setup is complete. The WiFi network serves a web-based configuration utility, as well as an unauthenticated ModBus protocol interface.
CVE-2023-33759 1 Splicecom 1 Maximiser Soft Pbx 2025-05-30 9.8 Critical
SpliceCom Maximiser Soft PBX v1.5 and before does not restrict excessive authentication attempts, allowing attackers to bypass authentication via a brute force attack.
CVE-2023-31654 1 Redis 1 Redisraft 2025-05-30 9.8 Critical
Redis raft master-1b8bd86 to master-7b46079 was discovered to contain an ODR violation via the component hiredisAllocFns at /opt/fs/redisraft/deps/hiredis/alloc.c.
CVE-2021-42147 1 Contiki-ng 1 Tinydtls 2025-05-30 9.1 Critical
Buffer over-read vulnerability in the dtls_sha256_update function in Contiki-NG tinyDTLS through master branch 53a0d97 allows remote attackers to cause a denial of service via crafted data packet.
CVE-2020-36772 1 Cloudlinux 1 Cagefs 2025-05-30 4.4 Medium
CloudLinux CageFS 7.0.8-2 or below insufficiently restricts file paths supplied to the sendmail proxy command. This allows local users to read and write arbitrary files of certain file formats outside the CageFS environment.