Vulnerabilities (CVE)

Filtered by CWE-20
Total 10626 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2022-30710 1 Google 1 Android 2022-06-11 9.4 HIGH 9.1 CRITICAL
Improper validation vulnerability in RemoteViews prior to SMR Jun-2022 Release 1 allows attackers to launch certain activities.
CVE-2022-30709 1 Google 1 Android 2022-06-11 5.0 MEDIUM 5.3 MEDIUM
Improper input validation check logic vulnerability in SECRIL prior to SMR Jun-2022 Release 1 allows attackers to trigger crash.
CVE-2018-4036 1 Macpaw 1 Cleanmymac X 2022-06-07 2.1 LOW 5.5 MEDIUM
The CleanMyMac X software contains an exploitable privilege escalation vulnerability due to improper input validation. An attacker with local access could use this vulnerability to modify the running kernel extensions on the system.
CVE-2018-4035 1 Macpaw 1 Cleanmymac X 2022-06-07 4.9 MEDIUM 5.5 MEDIUM
The CleanMyMac X software contains an exploitable privilege escalation vulnerability that exists due to improper input validation. An attacker with local access could use this vulnerability to modify the file system as root.
CVE-2018-4034 1 Macpaw 1 Cleanmymac X 2022-06-07 4.9 MEDIUM 5.5 MEDIUM
The CleanMyMac X software contains an exploitable privilege escalation vulnerability that exists due to improper input validation. An attacker with local access could use this vulnerability to modify the file system as root.
CVE-2018-4033 1 Macpaw 1 Cleanmymac X 2022-06-07 6.6 MEDIUM 5.5 MEDIUM
The CleanMyMac X software contains an exploitable privilege escalation vulnerability due to improper input validation. An attacker with local access could use this vulnerability to modify the file system as root.
CVE-2018-4032 1 Macpaw 1 Cleanmymac X 2022-06-07 6.6 MEDIUM 5.5 MEDIUM
An exploitable privilege escalation vulnerability exists in the way the CleanMyMac X software improperly validates inputs. An attacker with local access could use this vulnerability to modify the file system as root. An attacker would need local access to the machine for a successful exploit.
CVE-2018-4053 1 Gog 1 Galaxy 2022-06-07 2.1 LOW 5.5 MEDIUM
An exploitable local denial-of-service vulnerability exists in the privileged helper tool of GOG Galaxy's Games, version 1.2.47 for macOS. An attacker can send malicious data to the root-listening service, causing the application to terminate and become unavailable.
CVE-2018-4055 1 Pixar 1 Renderman 2022-06-07 2.1 LOW 5.5 MEDIUM
A local privilege escalation vulnerability exists in the install helper tool of the Mac OS X version of Pixar Renderman, version 22.2.0. A user with local access can use this vulnerability to read any root file from the file system. An attacker would need local access to the machine to successfully exploit this flaw.
CVE-2018-4054 1 Pixar 1 Renderman 2022-06-07 7.2 HIGH 7.8 HIGH
A local privilege escalation vulnerability exists in the install helper tool of the Mac OS X version of Pixar Renderman, version 22.2.0. A user with local access can use this vulnerability to escalate their privileges to root. An attacker would need local access to the machine to successfully exploit this flaw.
CVE-2018-4047 1 Macpaw 1 Cleanmymac X 2022-06-07 4.9 MEDIUM 5.5 MEDIUM
An exploitable privilege escalation vulnerability exists in the helper service of Clean My Mac X, version 4.04, due to improper input validation. An attacker with local access could exploit this vulnerability to modify the file system as root.
CVE-2018-4046 1 Macpaw 1 Cleanmymac X 2022-06-07 2.1 LOW 5.5 MEDIUM
An exploitable denial-of-service vulnerability exists in the helper service of Clean My Mac X, version 4.04, due to improper input validation. A user with local access can use this vulnerability to terminate a privileged helper application. An attacker would need local access to the machine for a successful exploit.
CVE-2018-4045 1 Macpaw 1 Cleanmymac X 2022-06-07 4.9 MEDIUM 5.5 MEDIUM
An exploitable privilege escalation vulnerability exists in the helper service of Clean My Mac X, version 4.04, due to improper input validation. An attacker with local access could exploit this vulnerability to modify the file system as root.
CVE-2018-4044 1 Macpaw 1 Cleanmymac X 2022-06-07 4.9 MEDIUM 5.5 MEDIUM
An exploitable privilege escalation vulnerability exists in the helper service of Clean My Mac X, version 4.04, due to improper input validation. An attacker with local access could exploit this vulnerability to modify the file system as root.
CVE-2018-4043 1 Macpaw 1 Cleanmymac X 2022-06-07 4.9 MEDIUM 5.5 MEDIUM
An exploitable privilege escalation vulnerability exists in the Clean My Mac X, version 4.04, helper service due to improper input validation. A user with local access can use this vulnerability to modify the file system as root. An attacker would need local access to the machine for a successful exploit.
CVE-2018-4042 1 Macpaw 1 Cleanmymac X 2022-06-07 4.9 MEDIUM 5.5 MEDIUM
An exploitable privilege escalation vulnerability exists in the helper service of Clean My Mac X, version 4.04, due to improper input validation. An attacker with local access could exploit this vulnerability to modify the file system as root.
CVE-2018-4041 1 Macpaw 1 Cleanmymac X 2022-06-07 4.9 MEDIUM 5.5 MEDIUM
An exploitable privilege escalation vulnerability exists in the helper service of Clean My Mac X, version 4.04, due to improper input validation. An attacker with local access could exploit this vulnerability to modify the file system as root.
CVE-2018-4037 1 Macpaw 1 Cleanmymac X 2022-06-07 2.1 LOW 5.5 MEDIUM
The CleanMyMac X software contains an exploitable privilege escalation vulnerability due to improper input validation. An attacker with local access can use this vulnerability to modify the file system as root.
CVE-2022-24418 1 Dell 56 Dell G5 5505, Dell G5 5505 Firmware, Inspiron 22-3275 and 53 more 2022-06-07 7.2 HIGH 6.7 MEDIUM
Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user may potentially exploit this vulnerability by using an SMI to gain arbitrary code execution during SMM.
CVE-2022-24417 1 Dell 56 Dell G5 5505, Dell G5 5505 Firmware, Inspiron 22-3275 and 53 more 2022-06-07 7.2 HIGH 6.7 MEDIUM
Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user may potentially exploit this vulnerability by using an SMI to gain arbitrary code execution during SMM.