Search and browse vulnerability records from NVD
Showing 50 of 825 CVEs
| CVE ID | Severity | Description | EPSS | Published | |
|---|---|---|---|---|---|
|
CVE-2024-53197
KEV
|
7.8 HIGH |
In the Linux kernel, the following vulnerability has been resolved: ALSA: usb-audio: Fix potential out-of-bound accesses for Extigy and Mbox devices A bogus device can provide a bNumConfigurations value that exceeds the initial value used in usb_get_configuration for allocating dev->config. This can lead to out-of-bounds accesses later, e.g. in usb_destroy_configuration. |
1.5% | 2024-12-27 | |
|
CVE-2024-3393
KEV
|
7.5 HIGH |
A Denial of Service vulnerability in the DNS Security feature of Palo Alto Networks PAN-OS software allows an unauthenticated attacker to send a malicious packet through the data plane of the firewall that reboots the firewall. Repeated attempts to trigger this condition will cause the firewall to enter maintenance mode. |
77.7% | 2024-12-27 | |
|
CVE-2024-53150
KEV
|
7.1 HIGH |
In the Linux kernel, the following vulnerability has been resolved: ALSA: usb-audio: Fix out of bounds reads when finding clock sources The current USB-audio driver code doesn't check bLength of each descriptor at traversing for clock descriptors. That is, when a device provides a bogus descriptor with a shorter bLength, the driver might hit out-of-bounds reads. For addressing it, this patch adds sanity checks to the validator functions for the clock descriptor traversal. When the descriptor length is shorter than expected, it's skipped in the loop. For the clock source and clock multiplier descriptors, we can just check bLength against the sizeof() of each descriptor type. OTOH, the clock selector descriptor of UAC2 and UAC3 has an array of bNrInPins elements and two more fields at its tail, hence those have to be checked in addition to the sizeof() check. |
0.9% | 2024-12-24 | |
|
CVE-2024-49138
KEV
|
7.8 HIGH |
Windows Common Log File System Driver Elevation of Privilege Vulnerability |
84.5% | 2024-12-12 | |
|
CVE-2024-53104
KEV
|
7.8 HIGH |
In the Linux kernel, the following vulnerability has been resolved: media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in uvc_parse_format This can lead to out of bounds writes since frames of this type were not taken into account when calculating the size of the frames buffer in uvc_parse_streaming. |
13.0% | 2024-12-02 | |
|
CVE-2024-11667
KEV
|
7.5 HIGH |
A directory traversal vulnerability in the web management interface of Zyxel ATP series firmware versions V5.00 through V5.38, USG FLEX series firmware versions V5.00 through V5.38, USG FLEX 50(W) series firmware versions V5.10 through V5.38, and USG20(W)-VPN series firmware versions V5.10 through V5.38 could allow an attacker to download or upload files via a crafted URL. |
34.2% | 2024-11-27 | |
|
CVE-2024-49035
KEV
|
8.7 HIGH |
An improper access control vulnerability in Partner.Microsoft.com allows an a unauthenticated attacker to elevate privileges over a network. |
6.2% | 2024-11-26 | |
|
CVE-2024-44308
KEV
|
8.8 HIGH |
The issue was addressed with improved checks. This issue is fixed in Safari 18.1.1, iOS 17.7.2 and iPadOS 17.7.2, macOS Sequoia 15.1.1, iOS 18.1.1 and iPadOS 18.1.1, visionOS 2.1.1. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited on Intel-based Mac systems. |
1.5% | 2024-11-20 | |
|
CVE-2024-21287
KEV
|
7.5 HIGH |
Vulnerability in the Oracle Agile PLM Framework product of Oracle Supply Chain (component: Software Development Kit, Process Extension). The supported version that is affected is 9.3.6. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Agile PLM Framework. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Agile PLM Framework accessible data. CVSS 3.1 Base Score 7.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N). |
69.8% | 2024-11-18 | |
|
CVE-2024-9474
KEV
|
7.2 HIGH |
A privilege escalation vulnerability in Palo Alto Networks PAN-OS software allows a PAN-OS administrator with access to the management web interface to perform actions on the firewall with root privileges. Cloud NGFW and Prisma Access are not impacted by this vulnerability. |
94.2% | 2024-11-18 | |
|
CVE-2024-43093
KEV
|
7.3 HIGH |
In shouldHideDocument of ExternalStorageProvider.java, there is a possible bypass of a file path filter designed to prevent access to sensitive directories due to incorrect unicode normalization. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation. |
0.2% | 2024-11-13 | |
|
CVE-2024-8069
KEV
|
8.0 HIGH |
Limited remote code execution with privilege of a NetworkService Account access in Citrix Session Recording if the attacker is an authenticated user on the same intranet as the session recording server |
48.3% | 2024-11-12 | |
|
CVE-2024-8068
KEV
|
8.0 HIGH |
Privilege escalation to NetworkService Account access in Citrix Session Recording when an attacker is an authenticated user in the same Windows Active Directory domain as the session recording server domain |
8.1% | 2024-11-12 | |
|
CVE-2024-49039
KEV
|
8.8 HIGH |
Windows Task Scheduler Elevation of Privilege Vulnerability |
63.2% | 2024-11-12 | |
|
CVE-2024-9463
KEV
|
7.5 HIGH |
An OS command injection vulnerability in Palo Alto Networks Expedition allows an unauthenticated attacker to run arbitrary OS commands as root in Expedition, resulting in disclosure of usernames, cleartext passwords, device configurations, and device API keys of PAN-OS firewalls. |
94.2% | 2024-10-09 | |
|
CVE-2024-43572
KEV
|
7.8 HIGH |
Microsoft Management Console Remote Code Execution Vulnerability |
44.6% | 2024-10-08 | |
|
CVE-2024-9380
KEV
|
7.2 HIGH |
An OS command injection vulnerability in the admin web console of Ivanti CSA before version 5.0.2 allows a remote authenticated attacker with admin privileges to obtain remote code execution. |
88.1% | 2024-10-08 | |
|
CVE-2024-43047
KEV
|
7.8 HIGH |
Memory corruption while maintaining memory maps of HLOS memory. |
1.7% | 2024-10-07 | |
|
CVE-2024-8957
KEV
|
7.2 HIGH |
PTZOptics PT30X-SDI/NDI-xx before firmware 6.3.40 is vulnerable to an OS command injection issue. The camera does not sufficiently validate the ntp_addr configuration value which may lead to arbitrary command execution when ntp_client is started. When chained with CVE-2024-8956, a remote and unauthenticated attacker can execute arbitrary OS commands on affected devices. |
55.5% | 2024-09-17 | |
|
CVE-2024-38813
KEV
|
7.5 HIGH |
The vCenter Server contains a privilege escalation vulnerability. A malicious actor with network access to vCenter Server may trigger this vulnerability to escalate privileges to root by sending a specially crafted network packet. |
31.1% | 2024-09-17 | |
|
CVE-2024-8190
KEV
|
7.2 HIGH |
An OS command injection vulnerability in Ivanti Cloud Services Appliance versions 4.6 Patch 518 and before allows a remote authenticated attacker to obtain remote code execution. The attacker must have admin level privileges to exploit this vulnerability. |
91.9% | 2024-09-10 | |
|
CVE-2024-43461
KEV
|
8.8 HIGH |
Windows MSHTML Platform Spoofing Vulnerability |
9.8% | 2024-09-10 | |
|
CVE-2024-38226
KEV
|
7.3 HIGH |
Microsoft Publisher Security Feature Bypass Vulnerability |
1.4% | 2024-09-10 | |
|
CVE-2024-38014
KEV
|
7.8 HIGH |
Windows Installer Elevation of Privilege Vulnerability |
12.8% | 2024-09-10 | |
|
CVE-2024-45195
KEV
|
7.5 HIGH |
Direct Request ('Forced Browsing') vulnerability in Apache OFBiz. This issue affects Apache OFBiz: before 18.12.16. Users are recommended to upgrade to version 18.12.16, which fixes the issue. |
94.1% | 2024-09-04 | |
|
CVE-2024-39717
KEV
|
7.2 HIGH |
The Versa Director GUI provides an option to customize the look and feel of the user interface. This option is only available for a user logged with Provider-Data-Center-Admin or Provider-Data-Center-System-Admin. (Tenant level users do not have this privilege). The “Change Favicon” (Favorite Icon) option can be mis-used to upload a malicious file ending with .png extension to masquerade as image file. This is possible only after a user with Provider-Data-Center-Admin or Provider-Data-Center-System-Admin has successfully authenticated and logged in. |
4.6% | 2024-08-22 | |
|
CVE-2024-7965
KEV
|
8.8 HIGH |
Inappropriate implementation in V8 in Google Chrome prior to 128.0.6613.84 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) |
26.8% | 2024-08-21 | |
|
CVE-2024-7262
KEV
|
7.8 HIGH |
Improper path validation in promecefpluginhost.exe in Kingsoft WPS Office version ranging from 12.2.0.13110 to 12.2.0.16412 (exclusive) on Windows allows an attacker to load an arbitrary Windows library. The vulnerability was found weaponized as a single-click exploit in the form of a deceptive spreadsheet document |
15.9% | 2024-08-15 | |
|
CVE-2024-38193
KEV
|
7.8 HIGH |
Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability |
74.8% | 2024-08-13 | |
|
CVE-2024-38189
KEV
|
8.8 HIGH |
Microsoft Project Remote Code Execution Vulnerability |
43.7% | 2024-08-13 | |
|
CVE-2024-38178
KEV
|
7.5 HIGH |
Scripting Engine Memory Corruption Vulnerability |
26.3% | 2024-08-13 | |
|
CVE-2024-38107
KEV
|
7.8 HIGH |
Windows Power Dependency Coordinator Elevation of Privilege Vulnerability |
3.4% | 2024-08-13 | |
|
CVE-2024-38106
KEV
|
7.0 HIGH |
Windows Kernel Elevation of Privilege Vulnerability |
0.8% | 2024-08-13 | |
|
CVE-2024-41710
KEV
|
7.2 HIGH |
A vulnerability in the Mitel 6800 Series, 6900 Series, and 6900w Series SIP Phones, including the 6970 Conference Unit, through R6.4.0.HF1 (R6.4.0.136) could allow an authenticated attacker with administrative privilege to conduct an argument injection attack, due to insufficient parameter sanitization during the boot process. A successful exploit could allow an attacker to execute arbitrary commands within the context of the system. |
19.7% | 2024-08-12 | |
|
CVE-2024-7694
KEV
|
7.2 HIGH |
ThreatSonar Anti-Ransomware from TeamT5 does not properly validate the content of uploaded files. Remote attackers with administrator privileges on the product platform can upload malicious files, which can be used to execute arbitrary system command on the server. |
1.6% | 2024-08-12 | |
|
CVE-2024-38112
KEV
|
7.5 HIGH |
Windows MSHTML Platform Spoofing Vulnerability |
92.6% | 2024-07-09 | |
|
CVE-2024-38094
KEV
|
7.2 HIGH |
Microsoft SharePoint Remote Code Execution Vulnerability |
64.3% | 2024-07-09 | |
|
CVE-2024-38080
KEV
|
7.8 HIGH |
Windows Hyper-V Elevation of Privilege Vulnerability |
22.0% | 2024-07-09 | |
|
CVE-2024-32896
KEV
|
7.8 HIGH |
there is a possible way to bypass due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation. |
0.2% | 2024-06-13 | |
|
CVE-2024-35250
KEV
|
7.8 HIGH |
Windows Kernel-Mode Driver Elevation of Privilege Vulnerability |
53.7% | 2024-06-11 | |
|
CVE-2024-30088
KEV
|
7.0 HIGH |
Windows Kernel Elevation of Privilege Vulnerability |
85.2% | 2024-06-11 | |
|
CVE-2024-36971
KEV
|
7.8 HIGH |
In the Linux kernel, the following vulnerability has been resolved: net: fix __dst_negative_advice() race __dst_negative_advice() does not enforce proper RCU rules when sk->dst_cache must be cleared, leading to possible UAF. RCU rules are that we must first clear sk->sk_dst_cache, then call dst_release(old_dst). Note that sk_dst_reset(sk) is implementing this protocol correctly, while __dst_negative_advice() uses the wrong order. Given that ip6_negative_advice() has special logic against RTF_CACHE, this means each of the three ->negative_advice() existing methods must perform the sk_dst_reset() themselves. Note the check against NULL dst is centralized in __dst_negative_advice(), there is no need to duplicate it in various callbacks. Many thanks to Clement Lecigne for tracking this issue. This old bug became visible after the blamed commit, using UDP sockets. |
0.4% | 2024-06-10 | |
|
CVE-2024-4610
KEV
|
7.8 HIGH |
Use After Free vulnerability in Arm Ltd Bifrost GPU Kernel Driver, Arm Ltd Valhall GPU Kernel Driver allows a local non-privileged user to make improper GPU memory processing operations to gain access to already freed memory.This issue affects Bifrost GPU Kernel Driver: from r34p0 through r40p0; Valhall GPU Kernel Driver: from r34p0 through r40p0. |
0.8% | 2024-06-07 | |
|
CVE-2024-28995
KEV
|
8.6 HIGH |
SolarWinds Serv-U was susceptible to a directory transversal vulnerability that would allow access to read sensitive files on the host machine. |
94.4% | 2024-06-06 | |
|
CVE-2024-29824
KEV
|
8.8 HIGH |
An unspecified SQL Injection vulnerability in Core server of Ivanti EPM 2022 SU5 and prior allows an unauthenticated attacker within the same network to execute arbitrary code. |
94.0% | 2024-05-31 | |
|
CVE-2024-24919
KEV
|
8.6 HIGH |
Potentially allowing an attacker to read certain information on Check Point Security Gateways once connected to the internet and enabled with remote Access VPN or Mobile Access Software Blades. A Security fix that mitigates this vulnerability is available. |
94.3% | 2024-05-28 | |
|
CVE-2024-4978
KEV
|
8.4 HIGH |
Justice AV Solutions Viewer Setup 8.3.7.250-1 contains a malicious binary when executed and is signed with an unexpected authenticode signature. A remote, privileged threat actor may exploit this vulnerability to execute of unauthorized PowerShell commands. |
14.1% | 2024-05-23 | |
|
CVE-2024-30051
KEV
|
7.8 HIGH |
Windows DWM Core Library Elevation of Privilege Vulnerability |
53.0% | 2024-05-14 | |
|
CVE-2024-30040
KEV
|
8.8 HIGH |
Windows MSHTML Platform Security Feature Bypass Vulnerability |
23.5% | 2024-05-14 | |
|
CVE-2024-4761
KEV
|
8.8 HIGH |
Out of bounds write in V8 in Google Chrome prior to 124.0.6367.207 allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page. (Chromium security severity: High) |
6.4% | 2024-05-14 |