IBM Db2 denial of service | CVE-2023-30446
NAME__________IBM Db2 denial of servicePlatforms Affected:IBM DB2 for Linux UNIX and Windows 10.5 IBM DB2 for Linux UNIX and Windows...
NAME__________IBM Db2 denial of servicePlatforms Affected:IBM DB2 for Linux UNIX and Windows 10.5 IBM DB2 for Linux UNIX and Windows...
NAME__________Node.js @fastify/oauth2 cross-site request forgeryPlatforms Affected:Node.js @fastify/oauth2 2.6.9 Node.js @fastify/oauth2 2.6.8Risk Level:7.4Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________Node.js @fastify/oauth2 is vulnerable to cross-site request...
NAME__________IBM Db2 denial of servicePlatforms Affected:IBM DB2 for Linux UNIX and Windows 10.5 IBM DB2 for Linux UNIX and Windows...
NAME__________IBM Db2 code executionPlatforms Affected:IBM DB2 for Linux UNIX and Windows 10.5 IBM DB2 for Linux UNIX and Windows 11.1...
NAME__________Mediatek Android privilege escalationPlatforms Affected:MediaTek AndroidRisk Level:6.7Exploitability:UnprovenConsequences:Gain Privileges DESCRIPTION__________Mediatek Android could allow a local authenticated attacker to gain elevated privileges...
NAME__________Mediatek Android denial of servicePlatforms Affected:MediaTek AndroidRisk Level:7.5Exploitability:UnprovenConsequences:Denial of Service DESCRIPTION__________Mediatek Android is vulnerable to a denial of service, caused...
NAME__________Mediatek Android denial of servicePlatforms Affected:MediaTek AndroidRisk Level:4.4Exploitability:UnprovenConsequences:Denial of Service DESCRIPTION__________Mediatek Android is vulnerable to a denial of service, caused...
NAME__________Mediatek Android privilege escalationPlatforms Affected:MediaTek AndroidRisk Level:6.7Exploitability:UnprovenConsequences:Gain Privileges DESCRIPTION__________Mediatek Android could allow a local authenticated attacker to gain elevated privileges...
NAME__________Mediatek Android denial of servicePlatforms Affected:MediaTek AndroidRisk Level:7.5Exploitability:UnprovenConsequences:Denial of Service DESCRIPTION__________Mediatek Android is vulnerable to a denial of service, caused...
NAME__________Mediatek Android privilege escalationPlatforms Affected:MediaTek AndroidRisk Level:6.7Exploitability:UnprovenConsequences:Gain Privileges DESCRIPTION__________Mediatek Android could allow a local authenticated attacker to gain elevated privileges...
NAME__________Mediatek Android denial of servicePlatforms Affected:MediaTek AndroidRisk Level:7.5Exploitability:UnprovenConsequences:Denial of Service DESCRIPTION__________Mediatek Android is vulnerable to a denial of service, caused...
NAME__________Milesight UR32L zebra vlan_name functionality command executionPlatforms Affected:Milesight UR32L 32.3.0.5Risk Level:7.2Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________Milesight UR32L could allow a remote authenticated attacker...
NAME__________Node.js @fastify/oauth2 cross-site request forgeryPlatforms Affected:Node.js @fastify/oauth2 2.6.9 Node.js @fastify/oauth2 2.6.8Risk Level:7.4Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________Node.js @fastify/oauth2 is vulnerable to cross-site request...
NAME__________Mediatek Android denial of servicePlatforms Affected:MediaTek AndroidRisk Level:7.5Exploitability:UnprovenConsequences:Denial of Service DESCRIPTION__________Mediatek Android is vulnerable to a denial of service, caused...
NAME__________Mediatek Android privilege escalationPlatforms Affected:MediaTek AndroidRisk Level:6.7Exploitability:UnprovenConsequences:Gain Privileges DESCRIPTION__________Mediatek Android could allow a local authenticated attacker to gain elevated privileges...
NAME__________Mediatek Android privilege escalationPlatforms Affected:MediaTek AndroidRisk Level:6.7Exploitability:UnprovenConsequences:Gain Privileges DESCRIPTION__________Mediatek Android could allow a local authenticated attacker to gain elevated privileges...
NAME__________Milesight UR32L libzebra.so bridge_group functionality command executionPlatforms Affected:Milesight UR32L 32.3.0.5Risk Level:7.2Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________Milesight UR32L could allow a remote authenticated attacker...
NAME__________Milesight UR32L directory traversalPlatforms Affected:Milesight UR32L 32.3.0.5Risk Level:6.5Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________Milesight UR32L could allow a remote attacker to traverse directories on...
NAME__________VMware SD-WAN (Edge) information disclosurePlatforms Affected:VMware SD-WAN (Edge) 5.0 VMware SD-WAN (Edge) 4.5Risk Level:5.3Exploitability:UnprovenConsequences:Obtain Information DESCRIPTION__________VMware SD-WAN (Edge) could allow...
NAME__________Mastodon spoofingPlatforms Affected:Mastodon Mastodon 2.6.0 Mastodon Mastodon 4.1.2 Mastodon Mastodon 4.0.4 Mastodon Mastodon 3.5.8Risk Level:5.4Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________Mastodon could allow a...
NAME__________IBM Cloud Object System cross-site scriptingPlatforms Affected:IBM Cloud Object Storage System 3.15.8.97Risk Level:6.4Exploitability:HighConsequences:Cross-Site Scripting DESCRIPTION__________IBM Cloud Object System 3.15.8.97 is...
NAME__________Milesight UR32L ys_thirdparty user_delete command executionPlatforms Affected:Milesight UR32L 32.3.0.5Risk Level:7.2Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________Milesight UR32L could allow a remote authenticated attacker to...
NAME__________ServiceNow cross-site scriptingPlatforms Affected:ServiceNow ServiceNow Tokyo ServiceNow ServiceNow Utah ServiceNow ServiceNow San DiegoRisk Level:4.3Exploitability:HighConsequences:Cross-Site Scripting DESCRIPTION__________ServiceNow is vulnerable to cross-site...
NAME__________Milesight UR32L zebra vlan_name functionality command executionPlatforms Affected:Milesight UR32L 32.3.0.5Risk Level:7.2Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________Milesight UR32L could allow a remote authenticated attacker...