Latest CVE Feed
-
8.8
HIGHCVE-2023-50739
A buffer overflow vulnerability has been identified in the Internet Printing Protocol (IPP) in various Lexmark devices. The vulnerability can be leveraged by an attacker to execute arbitrary code.... Read more
Affected Products :- Published: Jan. 18, 2025
- Modified: Jan. 18, 2025
- Vuln Type: Memory Corruption
-
7.8
HIGHCVE-2018-9464
In multiple locations, there is a possible way to read protected files due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.... Read more
Affected Products : android- Published: Jan. 18, 2025
- Modified: Jul. 10, 2025
- Vuln Type: Authorization
-
7.0
HIGHCVE-2018-9461
In onAttachFragment of ShareIntentActivity.java, there is a possible way for an app to read files in the messages app due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interactio... Read more
Affected Products : android- Published: Jan. 18, 2025
- Modified: Jul. 10, 2025
- Vuln Type: Race Condition
-
5.5
MEDIUMCVE-2018-9406
In NlpService, there is a possible way to obtain location information due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.... Read more
Affected Products : android- Published: Jan. 18, 2025
- Modified: Jan. 31, 2025
- Vuln Type: Authorization
-
6.7
MEDIUMCVE-2018-9405
In BnDmAgent::onTransact of dm_agent.cpp, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.... Read more
Affected Products : android- Published: Jan. 18, 2025
- Modified: Jul. 10, 2025
- Vuln Type: Memory Corruption
-
7.8
HIGHCVE-2018-9401
In many locations, there is a possible way to access kernel memory in user space due to an incorrect bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploita... Read more
Affected Products : android- Published: Jan. 18, 2025
- Modified: Jul. 10, 2025
- Vuln Type: Memory Corruption
-
7.8
HIGHCVE-2018-9389
In ip6_append_data of ip6_output.c, there is a possible way to achieve code execution due to a heap buffer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploi... Read more
Affected Products : android- Published: Jan. 18, 2025
- Modified: Feb. 03, 2025
- Vuln Type: Memory Corruption
-
7.8
HIGHCVE-2018-9387
In multiple functions of mnh-sm.c, there is a possible way to trigger a heap overflow due to an integer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitat... Read more
Affected Products : android- Published: Jan. 18, 2025
- Modified: Jul. 10, 2025
- Vuln Type: Memory Corruption
-
7.3
HIGHCVE-2025-23208
zot is a production-ready vendor-neutral OCI image registry. The group data stored for users in the boltdb database (meta.db) is an append-list so group revocations/removals are ignored in the API. SetUserGroups is alled on login, but instead of replacing... Read more
Affected Products : zot- Published: Jan. 17, 2025
- Modified: Jan. 17, 2025
- Vuln Type: Authorization
-
5.5
MEDIUMCVE-2018-9447
In onCreate of EmergencyCallbackModeExitDialog.java, there is a possible way to crash the emergency callback mode due to a missing null check. This could lead to local denial of service with no additional execution privileges needed. User interaction is n... Read more
Affected Products : android- Published: Jan. 17, 2025
- Modified: Jul. 10, 2025
- Vuln Type: Denial of Service
-
7.8
HIGHCVE-2018-9434
In multiple functions of Parcel.cpp, there is a possible way to bypass address space layout randomization. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.... Read more
Affected Products : android- Published: Jan. 17, 2025
- Modified: Jul. 10, 2025
- Vuln Type: Memory Corruption
-
4.4
MEDIUMCVE-2018-9384
In multiple locations, there is a possible way to bypass KASLR due to an unusual root cause. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.... Read more
Affected Products : android- Published: Jan. 17, 2025
- Modified: Jul. 10, 2025
- Vuln Type: Information Disclosure
-
4.4
MEDIUMCVE-2018-9383
In asn1_ber_decoder of asn1_decoder.c, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.... Read more
Affected Products : android- Published: Jan. 17, 2025
- Modified: Jul. 10, 2025
- Vuln Type: Information Disclosure
-
7.8
HIGHCVE-2018-9382
In multiple functions of WifiServiceImpl.java, there is a possible way to activate Wi-Fi hotspot from a non-owner profile due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. U... Read more
Affected Products : android- Published: Jan. 17, 2025
- Modified: Jul. 10, 2025
- Vuln Type: Authorization
-
5.5
MEDIUMCVE-2018-9379
In multiple functions of MiniThumbFile.java, there is a possible way to view the thumbnails of deleted photos due to a confused deputy. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not... Read more
Affected Products : android- Published: Jan. 17, 2025
- Modified: Jul. 10, 2025
- Vuln Type: Information Disclosure
-
7.8
HIGHCVE-2018-9375
In multiple functions of UserDictionaryProvider.java, there is a possible way to add and delete words in the user dictionary due to a confused deputy. This could lead to local escalation of privilege with no additional execution privileges needed. User in... Read more
Affected Products : android- Published: Jan. 17, 2025
- Modified: Jul. 03, 2025
- Vuln Type: Authorization
-
10.0
CRITICALCVE-2017-13322
In endCallForSubscriber of PhoneInterfaceManager.java, there is a possible way to prevent access to emergency services due to a logic error in the code. This could lead to a local denial of service with no additional execution privileges needed. User int... Read more
Affected Products : android- Published: Jan. 17, 2025
- Modified: Mar. 13, 2025
- Vuln Type: Denial of Service
-
6.3
MEDIUMCVE-2025-23207
KaTeX is a fast, easy-to-use JavaScript library for TeX math rendering on the web. KaTeX users who render untrusted mathematical expressions with `renderToString` could encounter malicious input using `\htmlData` that runs arbitrary JavaScript, or generat... Read more
Affected Products :- Published: Jan. 17, 2025
- Modified: Jan. 17, 2025
- Vuln Type: Cross-Site Scripting
-
9.8
CRITICALCVE-2025-0541
A vulnerability was found in Codezips Gym Management System 1.0 and classified as critical. This issue affects some unknown processing of the file /dashboard/admin/edit_member.php. The manipulation of the argument name leads to sql injection. The attack m... Read more
- Published: Jan. 17, 2025
- Modified: Feb. 25, 2025
- Vuln Type: Injection
-
1.8
LOWCVE-2025-23206
The AWS Cloud Development Kit (AWS CDK) is an open-source software development framework to define cloud infrastructure in code and provision it through AWS CloudFormation. Users who use IAM OIDC custom resource provider package will download CA Thumbprin... Read more
Affected Products : aws_cloud_development_kit- Published: Jan. 17, 2025
- Modified: Jan. 17, 2025
- Vuln Type: Misconfiguration