BETA-Cybersecurity-Werkzeug
Schwachstellen-Datenbank mit Threat-Intelligence Informationen
Umfassende Schwachstellendatenbank mit kombinierten Common-Vulnerability-Scoring-System (CVSS)- und Exploit-Prediction-Scoring-System (EPSS)-Bewertungen zur Priorisierung von Sicherheitslücken nach Schweregrad und Exploit-Wahrscheinlichkeit.
Diese Datenbank nutzt das FlawFix Projekt, welches durch die OWASP als Incubating Projekt aufgenommen wurde.
Base CVSS: CVSS (Common Vulnerability Scoring System) ist ein standardisiertes Bewertungssystem zur Quantifizierung der Schwere von Computersicherheitslücken, das Faktoren wie Angriffsvektoren, Komplexität, Auswirkungen und erforderliche Privilegien berücksichtigt.
Angepasster CVSS: Ein angepasster CVSS (Common Vulnerability Scoring System) berücksichtigt den eigenen Schutzbedarf und die aktuelle Bedrohungslage einer Organisation, um die Relevanz und Schwere einer Schwachstelle präziser zu bewerten.
EPSS: EPSS (Exploit Prediction Scoring System) ist ein Modell zur Vorhersage der Wahrscheinlichkeit, dass eine Software-Schwachstelle innerhalb von 30 Tagen ausgenutzt wird, basierend auf verschiedenen technischen und sozialen Faktoren. Mehr Informationen finden Sie auf der Seite der Organisation FIRST.
CVE | Base CVSS | Angepasster CVSS | EPSS | First reported | Message |
---|---|---|---|---|---|
CVE-2024-46794 | 3.3 | 3.1 | 0.04% | Wed Sep 18 2024 | In the Linux kernel, the following vulnerability has been resolved: x86/tdx: Fix data leak in mmio_read() The mmio_read() function makes a TDVMCALL to retrieve MMIO data for an address from the VMM. Sean noticed that mmio_read() unintentionally exposes the value of an initialized variable (val) on the stack to the VMM. This variable is only needed as an output value. It did not need to be passed to the VMM in the first place. Do not send the original value of *val to the VMM. [ dhansen: clarify what 'val' is used for. ] |
CVE-2024-46812 | 7.8 | 7.1 | 0.04% | Fri Sep 27 2024 | In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Skip inactive planes within ModeSupportAndSystemConfiguration [Why] Coverity reports Memory - illegal accesses. [How] Skip inactive planes. |
CVE-2024-46827 | 5.5 | 5.1 | 0.04% | Fri Sep 27 2024 | In the Linux kernel, the following vulnerability has been resolved: wifi: ath12k: fix firmware crash due to invalid peer nss Currently, if the access point receives an association request containing an Extended HE Capabilities Information Element with an invalid MCS-NSS, it triggers a firmware crash. This issue arises when EHT-PHY capabilities shows support for a bandwidth and MCS-NSS set for that particular bandwidth is filled by zeros and due to this, driver obtains peer_nss as 0 and sending this value to firmware causes crash. Address this issue by implementing a validation step for the peer_nss value before passing it to the firmware. If the value is greater than zero, proceed with forwarding it to the firmware. However, if the value is invalid, reject the association request to prevent potential firmware crashes. Tested-on: QCN9274 hw2.0 PCI WLAN.WBE.1.0.1-00029-QCAHKSWPL_SILICONZ-1 |
CVE-2024-33014 | 7.5 | 6.9 | 0.05% | Mon Aug 05 2024 | Transient DOS while parsing ESP IE from beacon/probe response frame. |
CVE-2024-52762 | 5.4 | 5 | 0.04% | Tue Nov 19 2024 | A cross-site scripting (XSS) vulnerability in the component /master/header.php of Ganglia-web v3.73 to v3.76 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the "tz" parameter. |
CVE-2024-52739 | 8 | 7.3 | 0.00% | Wed Nov 20 2024 | D-LINK DI-8400 v16.07.26A1 was discovered to contain multiple remote command execution (RCE) vulnerabilities in the msp_info_htm function via the flag and cmd parameters. |
CVE-2024-52714 | 9.8 | 9 | 0.04% | Tue Nov 19 2024 | Tenda AC6 v2.0 v15.03.06.50 was discovered to contain a buffer overflow in the function 'fromSetSysTime. |
CVE-2024-48899 | 4.3 | 4 | 0.00% | Wed Nov 20 2024 | A vulnerability was found in Moodle. Additional checks are required to ensure users can only fetch the list of course badges for courses that they are intended to have access to. |
CVE-2024-45691 | 5.4 | 5 | 0.00% | Wed Nov 20 2024 | A flaw was found in Moodle. When restricting access to a lesson activity with a password, certain passwords could be bypassed or less secure due to a loose comparison in the password-checking logic. This issue only affected passwords set to "magic hash" values. |
CVE-2024-45689 | 6.5 | 6 | 0.00% | Wed Nov 20 2024 | A flaw was found in Moodle. Dynamic tables did not enforce capability checks, which resulted in users having the ability to retrieve information they did not have permission to access. |
CVE-2018-9409 | 7.8 | 7.1 | 0.04% | Tue Nov 19 2024 | In HWCSession::SetColorModeById of hwc_session.cpp, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. |
CVE-2018-9371 | 7.8 | 7.1 | 0.04% | Tue Nov 19 2024 | In the Mediatek Preloader, there are out of bounds reads and writes due to an exposed interface that allows arbitrary peripheral memory mapping with insufficient blacklisting/whitelisting. This could lead to local elevation of privilege, given physical access to the device with no additional execution privileges needed. User interaction is needed for exploitation. |
CVE-2024-50060 | 5.5 | 5.1 | 0.04% | Mon Oct 21 2024 | In the Linux kernel, the following vulnerability has been resolved: io_uring: check if we need to reschedule during overflow flush In terms of normal application usage, this list will always be empty. And if an application does overflow a bit, it'll have a few entries. However, nothing obviously prevents syzbot from running a test case that generates a ton of overflow entries, and then flushing them can take quite a while. Check for needing to reschedule while flushing, and drop our locks and do so if necessary. There's no state to maintain here as overflows always prune from head-of-list, hence it's fine to drop and reacquire the locks at the end of the loop. |
CVE-2024-50056 | 5.5 | 5.1 | 0.04% | Mon Oct 21 2024 | In the Linux kernel, the following vulnerability has been resolved: usb: gadget: uvc: Fix ERR_PTR dereference in uvc_v4l2.c Fix potential dereferencing of ERR_PTR() in find_format_by_pix() and uvc_v4l2_enum_format(). Fix the following smatch errors: drivers/usb/gadget/function/uvc_v4l2.c:124 find_format_by_pix() error: 'fmtdesc' dereferencing possible ERR_PTR() drivers/usb/gadget/function/uvc_v4l2.c:392 uvc_v4l2_enum_format() error: 'fmtdesc' dereferencing possible ERR_PTR() Also, fix similar issue in uvc_v4l2_try_format() for potential dereferencing of ERR_PTR(). |
CVE-2024-50065 | 5.5 | 5.1 | 0.04% | Mon Oct 21 2024 | In the Linux kernel, the following vulnerability has been resolved: ntfs3: Change to non-blocking allocation in ntfs_d_hash d_hash is done while under "rcu-walk" and should not sleep. __get_name() allocates using GFP_KERNEL, having the possibility to sleep when under memory pressure. Change the allocation to GFP_NOWAIT. |
CVE-2024-33015 | 7.5 | 6.9 | 0.05% | Mon Aug 05 2024 | Transient DOS while parsing SCAN RNR IE when bytes received from AP is such that the size of the last param of IE is less than neighbor report. |
CVE-2023-52265 | 5.4 | 5 | 0.04% | Sat Dec 30 2023 | IDURAR (aka idurar-erp-crm) through 2.0.1 allows stored XSS via a PATCH request with a crafted JSON email template in the /api/email/update data. |
CVE-2023-27742 | 9.8 | 9.3 | 0.13% | Tue May 16 2023 | IDURAR ERP/CRM v1 was discovered to contain a SQL injection vulnerability via the component /api/login. |
CVE-2024-33025 | 7.5 | 6.9 | 0.05% | Mon Aug 05 2024 | Transient DOS while parsing the BSS parameter change count or MLD capabilities fields of the ML IE. |
CVE-2024-33024 | 7.5 | 6.9 | 0.05% | Mon Aug 05 2024 | Transient DOS while parsing the ML IE when a beacon with length field inside the common info of ML IE greater than the ML IE length. |
CVE-2024-33018 | 7.5 | 6.9 | 0.05% | Mon Aug 05 2024 | Transient DOS while parsing the received TID-to-link mapping element of the TID-to-link mapping action frame. |
CVE-2024-33026 | 7.5 | 6.9 | 0.05% | Mon Aug 05 2024 | Transient DOS while parsing probe response and assoc response frame when received frame length is less than max size of timestamp. |
CVE-2018-9487 | 6.5 | 6 | 0.00% | Wed Nov 20 2024 | In setVpnForcedLocked of Vpn.java, there is a possible blocking of internet traffic through vpn due to a bad uid check. This could lead to local denial of service with no additional execution privileges needed. User interaction is needed for exploitation. |
CVE-2018-9486 | 6.5 | 6 | 0.00% | Wed Nov 20 2024 | In hidh_l2cif_data_ind of hidh_conn.cc, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure over bluetooth with no additional execution privileges needed. User interaction is not needed for exploitation. |
CVE-2018-9485 | 6.5 | 6 | 0.00% | Wed Nov 20 2024 | In l2cble_process_sig_cmd of l2c_ble.cc, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure over bluetooth with no additional execution privileges needed. User interaction is not needed for exploitation. |
Showing 1 of 9980 pages (249493 items)