CVE Vulnerabilities
CVE vulnerability database enriched with CISA KEV and NVD data
| CVE ID | CVSS | Severity | KEV | Sightings |
|---|---|---|---|---|
| CVE-2023-29532 A local attacker can trick the Mozilla Maintenance Service into applying an unsigned update file by pointing the service at an update file on a malicious SMB server. The update file can be replaced af... | 5.5 | MEDIUM | — | 0 |
| CVE-2019-25136 A compromised child process could have injected XBL Bindings into privileged CSS rules, resulting in arbitrary code execution and a sandbox escape. This vulnerability affects Firefox < 70. | 10.0 | CRITICAL | — | 0 |
| CVE-2023-0368 The Responsive Tabs For WPBakery Page Builder (formerly Visual Composer) WordPress plugin through 1.1 does not validate and escape some of its shortcode attributes before outputting them back in a pag... | 5.4 | MEDIUM | — | 0 |
| CVE-2023-25733 The return value from `gfx::SourceSurfaceSkia::Map()` wasn't being verified which could have potentially lead to a null pointer dereference. This vulnerability affects Firefox < 110. | 7.5 | HIGH | — | 0 |
| CVE-2023-25747 A potential use-after-free in libaudio was fixed by disabling the AAudio backend when running on Android API below version 30. *This bug only affects Firefox for Android. Other versions of Firefox are... | 7.5 | HIGH | — | 0 |
| CVE-2023-29534 Different techniques existed to obscure the fullscreen notification in Firefox and Focus for Android. These could have led to potential user confusion and spoofing attacks. *This bug only affects Fi... | 9.1 | CRITICAL | — | 0 |
| CVE-2023-29542 A newline in a filename could have been used to bypass the file extension security mechanisms that replace malicious file extensions such as .lnk with .download. This could have led to accidental exe... | 9.8 | CRITICAL | — | 0 |
| CVE-2023-29545 Similar to CVE-2023-28163, this time when choosing 'Save Link As', suggested filenames containing environment variable names would have resolved those in the context of the current user. *This bug o... | 6.5 | MEDIUM | — | 0 |
| CVE-2023-29546 When recording the screen while in Private Browsing on Firefox for Android the address bar and keyboard were not hidden, potentially leaking sensitive information. *This bug only affects Firefox for... | 6.5 | MEDIUM | — | 0 |
| CVE-2023-2684 The File Renaming on Upload WordPress plugin before 2.5.2 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting... | 4.8 | MEDIUM | — | 0 |
| CVE-2023-2221 The WP Custom Cursors WordPress plugin before 3.2 does not properly sanitise and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by users with a role as l... | 7.2 | HIGH | — | 0 |
| CVE-2023-2359 The Slider Revolution WordPress plugin through 6.6.12 does not check for valid image files upon import, leading to an arbitrary file upload which may be escalated to Remote Code Execution in some serv... | 8.8 | HIGH | — | 0 |
| CVE-2023-2399 The QuBot WordPress plugin before 1.1.6 doesn't filter user input on chat, leading to bad code inserted on it be reflected on the user dashboard. | 6.1 | MEDIUM | — | 0 |
| CVE-2023-2401 The QuBot WordPress plugin before 1.1.6 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when... | 4.8 | MEDIUM | — | 0 |
| CVE-2023-2492 The QueryWall: Plug'n Play Firewall WordPress plugin through 1.1.1 does not properly sanitise and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by high ... | 7.2 | HIGH | — | 0 |
| CVE-2023-2527 The Integration for Contact Form 7 and Zoho CRM, Bigin WordPress plugin before 1.2.4 does not properly sanitise and escape a parameter before using it in a SQL statement, leading to a SQL injection ex... | 4.8 | MEDIUM | — | 0 |
| CVE-2023-2654 The Conditional Menus WordPress plugin before 1.2.1 does not escape a parameter before outputting it back in an attribute, leading to a Reflected Cross-Site Scripting which could be used against high ... | 6.1 | MEDIUM | — | 0 |
| CVE-2022-48492 Configuration defects in the secure OS module.Successful exploitation of this vulnerability will affect availability. | 7.5 | HIGH | — | 0 |
| CVE-2023-2719 The SupportCandy WordPress plugin before 3.1.7 does not properly sanitise and escape the `id` parameter for an Agent in the REST API before using it in an SQL statement, leading to an SQL Injection ex... | 8.8 | HIGH | — | 0 |
| CVE-2023-2751 The Upload Resume WordPress plugin through 1.2.0 does not validate the captcha parameter when uploading a resume via the resume_upload_form shortcode, allowing unauthenticated visitors to upload arbit... | 5.3 | MEDIUM | — | 0 |
| CVE-2023-2779 The Social Share, Social Login and Social Comments WordPress plugin before 7.13.52 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scr... | 6.1 | MEDIUM | — | 0 |
| CVE-2023-2899 The Google Map Shortcode WordPress plugin through 3.1.2 does not validate and escape some of its shortcode attributes before outputting them back in the page, which could allow users with a role as lo... | 5.4 | MEDIUM | — | 0 |
| CVE-2022-48486 Configuration defects in the secure OS module.Successful exploitation of this vulnerability will affect availability. | 7.5 | HIGH | — | 0 |
| CVE-2022-48488 Vulnerability of bypassing the default desktop security controls.Successful exploitation of this vulnerability may cause unauthorized modifications to the desktop. | 5.3 | MEDIUM | — | 0 |
| CVE-2022-48489 Configuration defects in the secure OS module.Successful exploitation of this vulnerability will affect availability. | 7.5 | HIGH | — | 0 |
| CVE-2022-48490 Configuration defects in the secure OS module.Successful exploitation of this vulnerability will affect availability. | 7.5 | HIGH | — | 0 |
| CVE-2022-48494 Vulnerability of lax app identity verification in the pre-authorization function.Successful exploitation of this vulnerability will cause malicious apps to become pre-authorized. | 7.5 | HIGH | — | 0 |
| CVE-2022-48496 Vulnerability of lax app identity verification in the pre-authorization function.Successful exploitation of this vulnerability will cause malicious apps to become pre-authorized. | 7.5 | HIGH | — | 0 |
| CVE-2022-48497 Configuration defects in the secure OS module.Successful exploitation of this vulnerability will affect availability. | 7.5 | HIGH | — | 0 |
| CVE-2022-48498 Configuration defects in the secure OS module.Successful exploitation of this vulnerability will affect availability. | 7.5 | HIGH | — | 0 |
| CVE-2022-48499 Configuration defects in the secure OS module.Successful exploitation of this vulnerability will affect availability. | 7.5 | HIGH | — | 0 |
| CVE-2023-34156 Vulnerability of services denied by early fingerprint APIs on HarmonyOS products.Successful exploitation of this vulnerability may cause services to be denied. | 5.3 | MEDIUM | — | 0 |
| CVE-2023-34158 Vulnerability of spoofing trustlists of Huawei desktop.Successful exploitation of this vulnerability can cause third-party apps to hide app icons on the desktop to prevent them from being uninstalled. | 5.3 | MEDIUM | — | 0 |
| CVE-2023-34159 Improper permission control vulnerability in the Notepad app.Successful exploitation of the vulnerability may lead to privilege escalation, which affects availability and confidentiality. | 9.8 | CRITICAL | — | 0 |
| CVE-2023-34160 Vulnerability of spoofing trustlists of Huawei desktop.Successful exploitation of this vulnerability can cause third-party apps to hide app icons on the desktop to prevent them from being uninstalled. | 5.3 | MEDIUM | — | 0 |
| CVE-2023-34161 nappropriate authorization vulnerability in the SettingsProvider module.Successful exploitation of this vulnerability may cause features to perform abnormally. | 7.5 | HIGH | — | 0 |
| CVE-2023-34162 Version update determination vulnerability in the user profile module.Successful exploitation of this vulnerability may cause repeated HMS Core updates and cause services to fail. | 7.5 | HIGH | — | 0 |
| CVE-2023-34163 Permission control vulnerability in the window management module.Successful exploitation of this vulnerability may cause features to perform abnormally. | 7.5 | HIGH | — | 0 |
| CVE-2023-34166 Vulnerability of system restart triggered by abnormal callbacks passed to APIs.Successful exploitation of this vulnerability may cause the system to restart. | 7.5 | HIGH | — | 0 |
| CVE-2023-34167 Vulnerability of spoofing trustlists of Huawei desktop.Successful exploitation of this vulnerability can cause third-party apps to hide app icons on the desktop to prevent them from being uninstalled. | 5.3 | MEDIUM | — | 0 |
| CVE-2020-20502 Cross Site Request Forgery found in yzCMS v.2.0 allows a remote attacker to execute arbitrary code via the token check function. | 6.5 | MEDIUM | — | 0 |
| CVE-2023-35843 NocoDB through 0.106.0 (or 0.109.1) has a path traversal vulnerability that allows an unauthenticated attacker to access arbitrary files on the server by manipulating the path parameter of the /downlo... | 7.5 | HIGH | — | 0 |
| CVE-2023-3315 Missing permission checks in Jenkins Team Concert Plugin 2.4.1 and earlier allow attackers with Overall/Read permission to check for the existence of an attacker-specified file path on the Jenkins con... | 4.3 | MEDIUM | — | 0 |
| CVE-2023-33495 Craft CMS through 4.4.9 is vulnerable to HTML Injection. | 6.1 | MEDIUM | — | 0 |
| CVE-2023-34596 A vulnerability in Aeotec WallMote Switch firmware v2.3 allows attackers to cause a Denial of Service (DoS) via a crafted Z-Wave message. | 6.5 | MEDIUM | — | 0 |
| CVE-2023-34597 A vulnerability in Fibaro Motion Sensor firmware v3.4 allows attackers to cause a Denial of Service (DoS) via a crafted Z-Wave message. | 6.5 | MEDIUM | — | 0 |
| CVE-2020-20067 File upload vulnerability in ebCMS v.1.1.0 allows a remote attacker to execute arbitrary code via the upload type parameter. | 8.8 | HIGH | — | 0 |
| CVE-2020-20070 Cross Site Scripting vulnerability found in wkeyuan DWSurvey 1.0 allows a remote attacker to execute arbitrary code via thequltemld parameter of the qu-multi-fillblank!answers.action file. | 6.1 | MEDIUM | — | 0 |
| CVE-2020-20918 An issue discovered in Pluck CMS v.4.7.10-dev2 allows a remote attacker to execute arbitrary php code via the hidden parameter to admin.php when editing a page. | 7.2 | HIGH | — | 0 |
| CVE-2020-20919 File upload vulnerability in Pluck CMS v.4.7.10-dev2 allows a remote attacker to execute arbitrary code and access sensitive information via the theme.php file. | 7.2 | HIGH | — | 0 |
This product uses data from the NVD API but is not endorsed or certified by the NVD.