U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.


The NVD is the U.S. government repository of standards based vulnerability management data represented using the Security Content Automation Protocol (SCAP). This data enables automation of vulnerability management, security measurement, and compliance. The NVD includes databases of security checklist references, security-related software flaws, misconfigurations, product names, and impact metrics.

For information on how to the cite the NVD, including the database's Digital Object Identifier (DOI), please consult NIST's Public Data Repository.

Last 20 Scored Vulnerability IDs & Summaries CVSS Severity
  • CVE-2023-3979 - An issue has been discovered in GitLab affecting all versions starting from 10.6 before 16.2.8, all versions starting from 16.3 before 16.3.5, all versions starting from 16.4 before 16.4.1. It was possible that upstream members to collaborate with... read CVE-2023-3979
    Published: September 29, 2023; 3:15:13 AM -0400

    V3.1: 4.3 MEDIUM

  • CVE-2023-32477 - Dell Common Event Enabler 8.9.8.2 for Windows and prior, contain an improper access control vulnerability. A local low-privileged malicious user may potentially exploit this vulnerability to gain elevated privileges.
    Published: September 29, 2023; 4:15:09 AM -0400

    V3.1: 7.8 HIGH

  • CVE-2023-20034 - Vulnerability in the Elasticsearch database used in the of Cisco SD-WAN vManage software could allow an unauthenticated, remote attacker to access the Elasticsearch configuration database of an affected device with the privileges of the elasticsea... read CVE-2023-20034
    Published: September 27, 2023; 2:15:10 PM -0400

    V3.1: 7.5 HIGH

  • CVE-2023-3120 - A vulnerability, which was classified as critical, was found in SourceCodester Service Provider Management System 1.0. This affects an unknown part of the file view_service.php. The manipulation of the argument id leads to sql injection. It is pos... read CVE-2023-3120
    Published: June 06, 2023; 7:15:10 AM -0400

    V3.1: 7.2 HIGH

  • CVE-2023-2769 - A vulnerability classified as critical has been found in SourceCodester Service Provider Management System 1.0. This affects an unknown part of the file /classes/Master.php?f=delete_service. The manipulation of the argument id leads to sql injecti... read CVE-2023-2769
    Published: May 17, 2023; 2:15:09 PM -0400

    V3.1: 8.8 HIGH

  • CVE-2023-2349 - A vulnerability classified as problematic has been found in SourceCodester Service Provider Management System 1.0. Affected is an unknown function of the file /admin/index.php. The manipulation of the argument page leads to cross site scripting. I... read CVE-2023-2349
    Published: April 27, 2023; 12:15:11 PM -0400

    V3.1: 5.4 MEDIUM

  • CVE-2023-2347 - A vulnerability was found in SourceCodester Service Provider Management System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /admin/services/manage_service.php. The manipulation of the argument id leads... read CVE-2023-2347
    Published: April 27, 2023; 11:15:13 AM -0400

    V3.1: 9.8 CRITICAL

  • CVE-2023-2345 - A vulnerability was found in SourceCodester Service Provider Management System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file /classes/Master.php?f=delete_inquiry. The manipulation leads to imprope... read CVE-2023-2345
    Published: April 27, 2023; 11:15:13 AM -0400

    V3.1: 9.8 CRITICAL

  • CVE-2023-34581 - Sourcecodester Service Provider Management System v1.0 is vulnerable to SQL Injection via the ID parameter in /php-spms/?page=services/view&id=2
    Published: June 12, 2023; 11:15:09 AM -0400

    V3.1: 9.8 CRITICAL

  • CVE-2023-3119 - A vulnerability, which was classified as critical, has been found in SourceCodester Service Provider Management System 1.0. Affected by this issue is some unknown functionality of the file view.php. The manipulation of the argument id leads to sql... read CVE-2023-3119
    Published: June 06, 2023; 7:15:10 AM -0400

    V3.1: 8.8 HIGH

  • CVE-2023-2350 - A vulnerability classified as problematic was found in SourceCodester Service Provider Management System 1.0. Affected by this vulnerability is an unknown functionality of the file /classes/Users.php. The manipulation of the argument id leads to c... read CVE-2023-2350
    Published: April 27, 2023; 12:15:11 PM -0400

    V3.1: 5.4 MEDIUM

  • CVE-2023-2348 - A vulnerability was found in SourceCodester Service Provider Management System 1.0. It has been rated as critical. This issue affects some unknown processing of the file /admin/user/manage_user.php. The manipulation of the argument id leads to sql... read CVE-2023-2348
    Published: April 27, 2023; 11:15:13 AM -0400

    V3.1: 9.8 CRITICAL

  • CVE-2023-2346 - A vulnerability was found in SourceCodester Service Provider Management System 1.0. It has been classified as critical. This affects an unknown part of the file /admin/inquiries/view_inquiry.php. The manipulation of the argument id leads to sql in... read CVE-2023-2346
    Published: April 27, 2023; 11:15:13 AM -0400

    V3.1: 9.8 CRITICAL

  • CVE-2023-2344 - A vulnerability has been found in SourceCodester Service Provider Management System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /classes/Master.php?f=save_service of the component HTTP POS... read CVE-2023-2344
    Published: April 27, 2023; 10:15:09 AM -0400

    V3.1: 9.8 CRITICAL

  • CVE-2023-39010 - BoofCV 0.42 was discovered to contain a code injection vulnerability via the component boofcv.io.calibration.CalibrationIO.load. This vulnerability is exploited by loading a crafted camera calibration file.
    Published: July 28, 2023; 11:15:12 AM -0400

    V3.1: 9.8 CRITICAL

  • CVE-2023-36658 - An issue was discovered in OPSWAT MetaDefender KIOSK 4.6.1.9996. It has an unquoted service path that can be abused locally.
    Published: September 15, 2023; 1:15:24 AM -0400

    V3.1: 7.8 HIGH

  • CVE-2014-8587 - SAPCRYPTOLIB before 5.555.38, SAPSECULIB, and CommonCryptoLib before 8.4.30, as used in SAP NetWeaver AS for ABAP and SAP HANA, allows remote attackers to spoof Digital Signature Algorithm (DSA) signatures via unspecified vectors.
    Published: November 04, 2014; 10:55:07 AM -0500

    V2.0: 7.5 HIGH

  • CVE-2023-3446 - Issue summary: Checking excessively long DH keys or parameters may be very slow. Impact summary: Applications that use the functions DH_check(), DH_check_ex() or EVP_PKEY_param_check() to check a DH key or DH parameters may experience long delays... read CVE-2023-3446
    Published: July 19, 2023; 8:15:10 AM -0400

    V3.1: 5.3 MEDIUM

  • CVE-2023-34468 - The DBCPConnectionPool and HikariCPConnectionPool Controller Services in Apache NiFi 0.0.2 through 1.21.0 allow an authenticated and authorized user to configure a Database URL with the H2 driver that enables custom code execution. The resolution... read CVE-2023-34468
    Published: June 12, 2023; 12:15:10 PM -0400

    V3.1: 8.8 HIGH

  • CVE-2023-42793 - In JetBrains TeamCity before 2023.05.4 authentication bypass leading to RCE on TeamCity Server was possible
    Published: September 19, 2023; 1:15:08 PM -0400

    V3.1: 9.8 CRITICAL