Search and browse vulnerability records from NVD
Showing 50 of 1483 CVEs
| CVE ID | Severity | Description | EPSS | Published | |
|---|---|---|---|---|---|
|
CVE-2024-4885
KEV
|
9.8 CRITICAL |
In WhatsUp Gold versions released before 2023.1.3, an unauthenticated Remote Code Execution vulnerability in Progress WhatsUpGold. The WhatsUp.ExportUtilities.Export.GetFileWithoutZip allows execution of commands with iisapppool\nmconsole privileges. |
94.3% | 2024-06-25 | |
|
CVE-2024-37085
KEV
|
6.8 MEDIUM |
VMware ESXi contains an authentication bypass vulnerability. A malicious actor with sufficient Active Directory (AD) permissions can gain full access to an ESXi host that was previously configured to use AD for user management https://blogs.vmware.com/vsphere/2012/09/joining-vsphere-hosts-to-active-directory.html by re-creating the configured AD group ('ESXi Admins' by default) after it was deleted from AD. |
71.9% | 2024-06-25 | |
|
CVE-2024-6047
KEV
|
9.8 CRITICAL |
Certain EOL GeoVision devices fail to properly filter user input for the specific functionality. Unauthenticated remote attackers can exploit this vulnerability to inject and execute arbitrary system commands on the device. |
73.0% | 2024-06-17 | |
|
CVE-2024-32896
KEV
|
7.8 HIGH |
there is a possible way to bypass due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation. |
0.2% | 2024-06-13 | |
|
CVE-2024-34102
KEV
|
9.8 CRITICAL |
Adobe Commerce versions 2.4.7, 2.4.6-p5, 2.4.5-p7, 2.4.4-p8 and earlier are affected by an Improper Restriction of XML External Entity Reference ('XXE') vulnerability that could result in arbitrary code execution. An attacker could exploit this vulnerability by sending a crafted XML document that references external entities. Exploitation of this issue does not require user interaction. |
94.1% | 2024-06-13 | |
|
CVE-2024-35250
KEV
|
7.8 HIGH |
Windows Kernel-Mode Driver Elevation of Privilege Vulnerability |
63.5% | 2024-06-11 | |
|
CVE-2024-30088
KEV
|
7.0 HIGH |
Windows Kernel Elevation of Privilege Vulnerability |
88.4% | 2024-06-11 | |
|
CVE-2024-36971
KEV
|
7.8 HIGH |
In the Linux kernel, the following vulnerability has been resolved: net: fix __dst_negative_advice() race __dst_negative_advice() does not enforce proper RCU rules when sk->dst_cache must be cleared, leading to possible UAF. RCU rules are that we must first clear sk->sk_dst_cache, then call dst_release(old_dst). Note that sk_dst_reset(sk) is implementing this protocol correctly, while __dst_negative_advice() uses the wrong order. Given that ip6_negative_advice() has special logic against RTF_CACHE, this means each of the three ->negative_advice() existing methods must perform the sk_dst_reset() themselves. Note the check against NULL dst is centralized in __dst_negative_advice(), there is no need to duplicate it in various callbacks. Many thanks to Clement Lecigne for tracking this issue. This old bug became visible after the blamed commit, using UDP sockets. |
0.4% | 2024-06-10 | |
|
CVE-2024-4577
KEV
|
9.8 CRITICAL |
In PHP versions 8.1.* before 8.1.29, 8.2.* before 8.2.20, 8.3.* before 8.3.8, when using Apache and PHP-CGI on Windows, if the system is set up to use certain code pages, Windows may use "Best-Fit" behavior to replace characters in command line given to Win32 API functions. PHP CGI module may misinterpret those characters as PHP options, which may allow a malicious user to pass options to PHP binary being run, and thus reveal the source code of scripts, run arbitrary PHP code on the server, etc. |
94.4% | 2024-06-09 | |
|
CVE-2024-4610
KEV
|
7.8 HIGH |
Use After Free vulnerability in Arm Ltd Bifrost GPU Kernel Driver, Arm Ltd Valhall GPU Kernel Driver allows a local non-privileged user to make improper GPU memory processing operations to gain access to already freed memory.This issue affects Bifrost GPU Kernel Driver: from r34p0 through r40p0; Valhall GPU Kernel Driver: from r34p0 through r40p0. |
0.5% | 2024-06-07 | |
|
CVE-2024-37383
KEV
|
6.1 MEDIUM |
Roundcube Webmail before 1.5.7 and 1.6.x before 1.6.7 allows XSS via SVG animate attributes. |
66.4% | 2024-06-07 | |
|
CVE-2024-28995
KEV
|
8.6 HIGH |
SolarWinds Serv-U was susceptible to a directory transversal vulnerability that would allow access to read sensitive files on the host machine. |
94.4% | 2024-06-06 | |
|
CVE-2024-29824
KEV
|
8.8 HIGH |
An unspecified SQL Injection vulnerability in Core server of Ivanti EPM 2022 SU5 and prior allows an unauthenticated attacker within the same network to execute arbitrary code. |
94.0% | 2024-05-31 | |
|
CVE-2024-23692
KEV
|
9.8 CRITICAL |
Rejetto HTTP File Server, up to and including version 2.3m, is vulnerable to a template injection vulnerability. This vulnerability allows a remote, unauthenticated attacker to execute arbitrary commands on the affected system by sending a specially crafted HTTP request. As of the CVE assignment date, Rejetto HFS 2.3m is no longer supported. |
94.3% | 2024-05-31 | |
|
CVE-2024-4358
KEV
|
9.8 CRITICAL |
In Progress Telerik Report Server, version 2024 Q1 (10.0.24.305) or earlier, on IIS, an unauthenticated attacker can gain access to Telerik Report Server restricted functionality via an authentication bypass vulnerability. |
94.3% | 2024-05-29 | |
|
CVE-2024-24919
KEV
|
8.6 HIGH |
Potentially allowing an attacker to read certain information on Check Point Security Gateways once connected to the internet and enabled with remote Access VPN or Mobile Access Software Blades. A Security fix that mitigates this vulnerability is available. |
94.3% | 2024-05-28 | |
|
CVE-2024-5274
KEV
|
9.6 CRITICAL |
Type Confusion in V8 in Google Chrome prior to 125.0.6422.112 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High) |
6.4% | 2024-05-28 | |
|
CVE-2024-4978
KEV
|
8.4 HIGH |
Justice AV Solutions Viewer Setup 8.3.7.250-1 contains a malicious binary when executed and is signed with an unexpected authenticode signature. A remote, privileged threat actor may exploit this vulnerability to execute of unauthorized PowerShell commands. |
14.1% | 2024-05-23 | |
|
CVE-2024-4947
KEV
|
9.6 CRITICAL |
Type Confusion in V8 in Google Chrome prior to 125.0.6422.60 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High) |
0.8% | 2024-05-15 | |
|
CVE-2024-30051
KEV
|
7.8 HIGH |
Windows DWM Core Library Elevation of Privilege Vulnerability |
51.9% | 2024-05-14 | |
|
CVE-2024-30040
KEV
|
8.8 HIGH |
Windows MSHTML Platform Security Feature Bypass Vulnerability |
23.5% | 2024-05-14 | |
|
CVE-2024-4761
KEV
|
8.8 HIGH |
Out of bounds write in V8 in Google Chrome prior to 124.0.6367.207 allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page. (Chromium security severity: High) |
2.8% | 2024-05-14 | |
|
CVE-2024-4671
KEV
|
9.6 CRITICAL |
Use after free in Visuals in Google Chrome prior to 124.0.6367.201 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High) |
0.2% | 2024-05-14 | |
|
CVE-2024-32113
KEV
|
9.8 CRITICAL |
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Apache OFBiz.This issue affects Apache OFBiz: before 18.12.13. Users are recommended to upgrade to version 18.12.13, which fixes the issue. |
94.0% | 2024-05-08 | |
|
CVE-2023-50224
KEV
|
6.5 MEDIUM |
TP-Link TL-WR841N dropbearpwd Improper Authentication Information Disclosure Vulnerability. This vulnerability allows network-adjacent attackers to disclose sensitive information on affected installations of TP-Link TL-WR841N routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the httpd service, which listens on TCP port 80 by default. The issue results from improper authentication. An attacker can leverage this vulnerability to disclose stored credentials, leading to further compromise. . Was ZDI-CAN-19899. |
2.4% | 2024-05-03 | |
|
CVE-2024-20359
KEV
|
6.0 MEDIUM |
A vulnerability in a legacy capability that allowed for the preloading of VPN clients and plug-ins and that has been available in Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, local attacker to execute arbitrary code with root-level privileges. Administrator-level privileges are required to exploit this vulnerability. This vulnerability is due to improper validation of a file when it is read from system flash memory. An attacker could exploit this vulnerability by copying a crafted file to the disk0: file system of an affected device. A successful exploit could allow the attacker to execute arbitrary code on the affected device after the next reload of the device, which could alter system behavior. Because the injected code could persist across device reboots, Cisco has raised the Security Impact Rating (SIR) of this advisory from Medium to High. |
0.2% | 2024-04-24 | |
|
CVE-2024-20353
KEV
|
8.6 HIGH |
A vulnerability in the management and VPN web servers for Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause the device to reload unexpectedly, resulting in a denial of service (DoS) condition. This vulnerability is due to incomplete error checking when parsing an HTTP header. An attacker could exploit this vulnerability by sending a crafted HTTP request to a targeted web server on a device. A successful exploit could allow the attacker to cause a DoS condition when the device reloads. |
18.0% | 2024-04-24 | |
|
CVE-2024-4040
KEV
|
9.8 CRITICAL |
A server side template injection vulnerability in CrushFTP in all versions before 10.7.1 and 11.1.0 on all platforms allows unauthenticated remote attackers to read files from the filesystem outside of the VFS Sandbox, bypass authentication to gain administrative access, and perform remote code execution on the server. |
94.4% | 2024-04-22 | |
|
CVE-2024-27348
KEV
|
9.8 CRITICAL |
RCE-Remote Command Execution vulnerability in Apache HugeGraph-Server.This issue affects Apache HugeGraph-Server: from 1.0.0 before 1.3.0 in Java8 & Java11 Users are recommended to upgrade to version 1.3.0 with Java11 & enable the Auth system, which fixes the issue. |
94.3% | 2024-04-22 | |
|
CVE-2024-3400
KEV
|
10.0 CRITICAL |
A command injection as a result of arbitrary file creation vulnerability in the GlobalProtect feature of Palo Alto Networks PAN-OS software for specific PAN-OS versions and distinct feature configurations may enable an unauthenticated attacker to execute arbitrary code with root privileges on the firewall. Cloud NGFW, Panorama appliances, and Prisma Access are not impacted by this vulnerability. |
94.3% | 2024-04-12 | |
|
CVE-2024-29988
KEV
|
8.8 HIGH |
SmartScreen Prompt Security Feature Bypass Vulnerability |
66.8% | 2024-04-09 | |
|
CVE-2024-29748
KEV
|
7.8 HIGH |
there is a possible way to bypass due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation. |
0.4% | 2024-04-05 | |
|
CVE-2024-29745
KEV
|
5.5 MEDIUM |
there is a possible Information Disclosure due to uninitialized data. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. |
0.2% | 2024-04-05 | |
|
CVE-2024-3273
KEV
|
7.3 HIGH |
** UNSUPPORTED WHEN ASSIGNED ** A vulnerability, which was classified as critical, was found in D-Link DNS-320L, DNS-325, DNS-327L and DNS-340L up to 20240403. Affected is an unknown function of the file /cgi-bin/nas_sharing.cgi of the component HTTP GET Request Handler. The manipulation of the argument system leads to command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-259284. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed immediately that the product is end-of-life. It should be retired and replaced. |
94.4% | 2024-04-04 | |
|
CVE-2024-3272
KEV
|
9.8 CRITICAL |
** UNSUPPORTED WHEN ASSIGNED ** A vulnerability, which was classified as very critical, has been found in D-Link DNS-320L, DNS-325, DNS-327L and DNS-340L up to 20240403. This issue affects some unknown processing of the file /cgi-bin/nas_sharing.cgi of the component HTTP GET Request Handler. The manipulation of the argument user with the input messagebus leads to hard-coded credentials. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-259283. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed immediately that the product is end-of-life. It should be retired and replaced. |
94.2% | 2024-04-04 | |
|
CVE-2024-29059
KEV
|
7.5 HIGH |
.NET Framework Information Disclosure Vulnerability |
93.8% | 2024-03-23 | |
|
CVE-2024-20767
KEV
|
7.4 HIGH |
ColdFusion versions 2023.6, 2021.12 and earlier are affected by an Improper Access Control vulnerability that could result in arbitrary file system read. An attacker could leverage this vulnerability to access or modify restricted files. Exploitation of this issue does not require user interaction. Exploitation of this issue requires the admin panel be exposed to the internet. |
94.2% | 2024-03-18 | |
|
CVE-2024-26169
KEV
|
7.8 HIGH |
Windows Error Reporting Service Elevation of Privilege Vulnerability |
34.6% | 2024-03-12 | |
|
CVE-2023-48788
KEV
|
9.8 CRITICAL |
A improper neutralization of special elements used in an sql command ('sql injection') in Fortinet FortiClientEMS version 7.2.0 through 7.2.2, FortiClientEMS 7.0.1 through 7.0.10 allows attacker to execute unauthorized code or commands via specially crafted packets. |
94.2% | 2024-03-12 | |
|
CVE-2024-23296
KEV
|
7.8 HIGH |
A memory corruption issue was addressed with improved validation. This issue is fixed in iOS 17.4 and iPadOS 17.4. An attacker with arbitrary kernel read and write capability may be able to bypass kernel memory protections. Apple is aware of a report that this issue may have been exploited. |
0.1% | 2024-03-05 | |
|
CVE-2024-23225
KEV
|
7.8 HIGH |
A memory corruption issue was addressed with improved validation. This issue is fixed in iOS 16.7.6 and iPadOS 16.7.6, iOS 17.4 and iPadOS 17.4. An attacker with arbitrary kernel read and write capability may be able to bypass kernel memory protections. Apple is aware of a report that this issue may have been exploited. |
0.1% | 2024-03-05 | |
|
CVE-2024-27198
KEV
|
9.8 CRITICAL |
In JetBrains TeamCity before 2023.11.4 authentication bypass allowing to perform admin actions was possible |
94.6% | 2024-03-04 | |
|
CVE-2024-1212
KEV
|
10.0 CRITICAL |
Unauthenticated remote attackers can access the system through the LoadMaster management interface, enabling arbitrary system command execution. |
94.3% | 2024-02-21 | |
|
CVE-2024-1709
KEV
|
10.0 CRITICAL |
ConnectWise ScreenConnect 23.9.7 and prior are affected by an Authentication Bypass Using an Alternate Path or Channel vulnerability, which may allow an attacker direct access to confidential information or critical systems. |
94.3% | 2024-02-21 | |
|
CVE-2024-20953
KEV
|
8.8 HIGH |
Vulnerability in the Oracle Agile PLM product of Oracle Supply Chain (component: Export). The supported version that is affected is 9.3.6. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Agile PLM. Successful attacks of this vulnerability can result in takeover of Oracle Agile PLM. CVSS 3.1 Base Score 8.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H). |
69.0% | 2024-02-17 | |
|
CVE-2024-23113
KEV
|
9.8 CRITICAL |
A use of externally-controlled format string in Fortinet FortiOS versions 7.4.0 through 7.4.2, 7.2.0 through 7.2.6, 7.0.0 through 7.0.13, FortiProxy versions 7.4.0 through 7.4.2, 7.2.0 through 7.2.8, 7.0.0 through 7.0.14, FortiPAM versions 1.2.0, 1.1.0 through 1.1.2, 1.0.0 through 1.0.3, FortiSwitchManager versions 7.2.0 through 7.2.3, 7.0.0 through 7.0.3 allows attacker to execute unauthorized code or commands via specially crafted packets. |
51.8% | 2024-02-15 | |
|
CVE-2024-21413
KEV
|
9.8 CRITICAL |
Microsoft Outlook Remote Code Execution Vulnerability |
93.4% | 2024-02-13 | |
|
CVE-2024-21412
KEV
|
8.1 HIGH |
Internet Shortcut Files Security Feature Bypass Vulnerability |
93.8% | 2024-02-13 | |
|
CVE-2024-21410
KEV
|
9.8 CRITICAL |
Microsoft Exchange Server Elevation of Privilege Vulnerability |
2.1% | 2024-02-13 | |
|
CVE-2024-21351
KEV
|
7.6 HIGH |
Windows SmartScreen Security Feature Bypass Vulnerability |
9.5% | 2024-02-13 |