Search and browse vulnerability records from NVD
Showing 50 of 1566 CVEs
| CVE ID | Severity | Description | EPSS | Published | |
|---|---|---|---|---|---|
|
CVE-2024-8069
KEV
|
8.0 HIGH |
Limited remote code execution with privilege of a NetworkService Account access in Citrix Session Recording if the attacker is an authenticated user on the same intranet as the session recording server |
48.3% | 2024-11-12 | |
|
CVE-2024-8068
KEV
|
8.0 HIGH |
Privilege escalation to NetworkService Account access in Citrix Session Recording when an attacker is an authenticated user in the same Windows Active Directory domain as the session recording server domain |
8.1% | 2024-11-12 | |
|
CVE-2024-49039
KEV
|
8.8 HIGH |
Windows Task Scheduler Elevation of Privilege Vulnerability |
63.7% | 2024-11-12 | |
|
CVE-2024-43451
KEV
|
6.5 MEDIUM |
NTLM Hash Disclosure Spoofing Vulnerability |
90.3% | 2024-11-12 | |
|
CVE-2024-51567
KEV
|
10.0 CRITICAL |
upgrademysqlstatus in databases/views.py in CyberPanel (aka Cyber Panel) before 5b08cd6 allows remote attackers to bypass authentication and execute arbitrary commands via /dataBases/upgrademysqlstatus by bypassing secMiddleware (which is only for a POST request) and using shell metacharacters in the statusfile property, as exploited in the wild in October 2024 by PSAUX. Versions through 2.3.6 and (unpatched) 2.3.7 are affected. |
94.3% | 2024-10-29 | |
|
CVE-2024-51378
KEV
|
10.0 CRITICAL |
getresetstatus in dns/views.py and ftp/views.py in CyberPanel (aka Cyber Panel) before 1c0c6cb allows remote attackers to bypass authentication and execute arbitrary commands via /dns/getresetstatus or /ftp/getresetstatus by bypassing secMiddleware (which is only for a POST request) and using shell metacharacters in the statusfile property, as exploited in the wild in October 2024 by PSAUX. Versions through 2.3.6 and (unpatched) 2.3.7 are affected. |
93.9% | 2024-10-29 | |
|
CVE-2024-50623
KEV
|
9.8 CRITICAL |
In Cleo Harmony before 5.8.0.21, VLTrader before 5.8.0.21, and LexiCom before 5.8.0.21, there is an unrestricted file upload and download that could lead to remote code execution. |
94.0% | 2024-10-28 | |
|
CVE-2024-20481
KEV
|
5.8 MEDIUM |
A vulnerability in the Remote Access VPN (RAVPN) service of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) of the RAVPN service. This vulnerability is due to resource exhaustion. An attacker could exploit this vulnerability by sending a large number of VPN authentication requests to an affected device. A successful exploit could allow the attacker to exhaust resources, resulting in a DoS of the RAVPN service on the affected device. Depending on the impact of the attack, a reload of the device may be required to restore the RAVPN service. Services that are not related to VPN are not affected. Cisco Talos discussed these attacks in the blog post Large-scale brute-force activity targeting VPNs, SSH services with commonly used login credentials. |
11.1% | 2024-10-23 | |
|
CVE-2024-47575
KEV
|
9.8 CRITICAL |
A missing authentication for critical function in FortiManager 7.6.0, FortiManager 7.4.0 through 7.4.4, FortiManager 7.2.0 through 7.2.7, FortiManager 7.0.0 through 7.0.12, FortiManager 6.4.0 through 6.4.14, FortiManager 6.2.0 through 6.2.12, Fortinet FortiManager Cloud 7.4.1 through 7.4.4, FortiManager Cloud 7.2.1 through 7.2.7, FortiManager Cloud 7.0.1 through 7.0.12, FortiManager Cloud 6.4.1 through 6.4.7 allows attacker to execute arbitrary code or commands via specially crafted requests. |
93.8% | 2024-10-23 | |
|
CVE-2024-41713
KEV
|
9.1 CRITICAL |
A vulnerability in the NuPoint Unified Messaging (NPM) component of Mitel MiCollab through 9.8 SP1 FP2 (9.8.1.201) could allow an unauthenticated attacker to conduct a path traversal attack, due to insufficient input validation. A successful exploit could allow unauthorized access, enabling the attacker to view, corrupt, or delete users' data and system configurations. |
94.1% | 2024-10-21 | |
|
CVE-2024-9537
KEV
|
9.8 CRITICAL |
ScienceLogic SL1 (formerly EM7) is affected by an unspecified vulnerability involving an unspecified third-party component packaged with SL1. The vulnerability is addressed in SL1 versions 12.1.3+, 12.2.3+, and 12.3+. Remediations have been made available for all SL1 versions back to version lines 10.1.x, 10.2.x, 11.1.x, 11.2.x, and 11.3.x. |
63.9% | 2024-10-18 | |
|
CVE-2024-9465
KEV
|
9.1 CRITICAL |
An SQL injection vulnerability in Palo Alto Networks Expedition allows an unauthenticated attacker to reveal Expedition database contents, such as password hashes, usernames, device configurations, and device API keys. With this, attackers can also create and read arbitrary files on the Expedition system. |
94.3% | 2024-10-09 | |
|
CVE-2024-9463
KEV
|
7.5 HIGH |
An OS command injection vulnerability in Palo Alto Networks Expedition allows an unauthenticated attacker to run arbitrary OS commands as root in Expedition, resulting in disclosure of usernames, cleartext passwords, device configurations, and device API keys of PAN-OS firewalls. |
94.2% | 2024-10-09 | |
|
CVE-2024-9680
KEV
|
9.8 CRITICAL |
An attacker was able to achieve code execution in the content process by exploiting a use-after-free in Animation timelines. We have had reports of this vulnerability being exploited in the wild. This vulnerability affects Firefox < 131.0.2, Firefox ESR < 128.3.1, Firefox ESR < 115.16.1, Thunderbird < 131.0.1, Thunderbird < 128.3.1, and Thunderbird < 115.16.0. |
30.8% | 2024-10-09 | |
|
CVE-2024-43573
KEV
|
6.5 MEDIUM |
Windows MSHTML Platform Spoofing Vulnerability |
17.7% | 2024-10-08 | |
|
CVE-2024-43572
KEV
|
7.8 HIGH |
Microsoft Management Console Remote Code Execution Vulnerability |
50.8% | 2024-10-08 | |
|
CVE-2024-43468
KEV
|
9.8 CRITICAL |
Microsoft Configuration Manager Remote Code Execution Vulnerability |
83.1% | 2024-10-08 | |
|
CVE-2024-9380
KEV
|
7.2 HIGH |
An OS command injection vulnerability in the admin web console of Ivanti CSA before version 5.0.2 allows a remote authenticated attacker with admin privileges to obtain remote code execution. |
88.1% | 2024-10-08 | |
|
CVE-2024-9379
KEV
|
6.5 MEDIUM |
SQL injection in the admin web console of Ivanti CSA before version 5.0.2 allows a remote authenticated attacker with admin privileges to run arbitrary SQL statements. |
81.7% | 2024-10-08 | |
|
CVE-2024-43047
KEV
|
7.8 HIGH |
Memory corruption while maintaining memory maps of HLOS memory. |
1.7% | 2024-10-07 | |
|
CVE-2024-45519
KEV
|
10.0 CRITICAL |
The postjournal service in Zimbra Collaboration (ZCS) before 8.8.15 Patch 46, 9 before 9.0.0 Patch 41, 10 before 10.0.9, and 10.1 before 10.1.1 sometimes allows unauthenticated users to execute commands. |
94.1% | 2024-10-02 | |
|
CVE-2024-8963
KEV
|
9.4 CRITICAL |
Path Traversal in the Ivanti CSA before 4.6 Patch 519 allows a remote unauthenticated attacker to access restricted functionality. |
94.2% | 2024-09-19 | |
|
CVE-2024-8957
KEV
|
7.2 HIGH |
PTZOptics PT30X-SDI/NDI-xx before firmware 6.3.40 is vulnerable to an OS command injection issue. The camera does not sufficiently validate the ntp_addr configuration value which may lead to arbitrary command execution when ntp_client is started. When chained with CVE-2024-8956, a remote and unauthenticated attacker can execute arbitrary OS commands on affected devices. |
55.5% | 2024-09-17 | |
|
CVE-2024-8956
KEV
|
9.1 CRITICAL |
PTZOptics PT30X-SDI/NDI-xx before firmware 6.3.40 is vulnerable to an insufficient authentication issue. The camera does not properly enforce authentication to /cgi-bin/param.cgi when requests are sent without an HTTP Authorization header. The result is a remote and unauthenticated attacker can leak sensitive data such as usernames, password hashes, and configurations details. Additionally, the attacker can update individual configuration values or overwrite the whole file. |
83.6% | 2024-09-17 | |
|
CVE-2024-38813
KEV
|
7.5 HIGH |
The vCenter Server contains a privilege escalation vulnerability. A malicious actor with network access to vCenter Server may trigger this vulnerability to escalate privileges to root by sending a specially crafted network packet. |
29.5% | 2024-09-17 | |
|
CVE-2024-38812
KEV
|
9.8 CRITICAL |
The vCenter Server contains a heap-overflow vulnerability in the implementation of the DCERPC protocol. A malicious actor with network access to vCenter Server may trigger this vulnerability by sending a specially crafted network packet potentially leading to remote code execution. |
77.9% | 2024-09-17 | |
|
CVE-2024-8190
KEV
|
7.2 HIGH |
An OS command injection vulnerability in Ivanti Cloud Services Appliance versions 4.6 Patch 518 and before allows a remote authenticated attacker to obtain remote code execution. The attacker must have admin level privileges to exploit this vulnerability. |
91.9% | 2024-09-10 | |
|
CVE-2024-43461
KEV
|
8.8 HIGH |
Windows MSHTML Platform Spoofing Vulnerability |
10.8% | 2024-09-10 | |
|
CVE-2024-38226
KEV
|
7.3 HIGH |
Microsoft Publisher Security Feature Bypass Vulnerability |
1.4% | 2024-09-10 | |
|
CVE-2024-38217
KEV
|
5.4 MEDIUM |
Windows Mark of the Web Security Feature Bypass Vulnerability |
12.1% | 2024-09-10 | |
|
CVE-2024-38014
KEV
|
7.8 HIGH |
Windows Installer Elevation of Privilege Vulnerability |
12.8% | 2024-09-10 | |
|
CVE-2024-40711
KEV
|
9.8 CRITICAL |
A deserialization of untrusted data vulnerability with a malicious payload can allow an unauthenticated remote code execution (RCE). |
68.2% | 2024-09-07 | |
|
CVE-2024-20439
KEV
|
9.8 CRITICAL |
A vulnerability in Cisco Smart Licensing Utility (CSLU) could allow an unauthenticated, remote attacker to log into an affected system by using a static administrative credential. This vulnerability is due to an undocumented static user credential for an administrative account. An attacker could exploit this vulnerability by using the static credentials to login to the affected system. A successful exploit could allow the attacker to login to the affected system with administrative rights over the CSLU application API. |
86.3% | 2024-09-04 | |
|
CVE-2024-45195
KEV
|
7.5 HIGH |
Direct Request ('Forced Browsing') vulnerability in Apache OFBiz. This issue affects Apache OFBiz: before 18.12.16. Users are recommended to upgrade to version 18.12.16, which fixes the issue. |
94.1% | 2024-09-04 | |
|
CVE-2024-6670
KEV
|
9.8 CRITICAL |
In WhatsUp Gold versions released before 2024.0.0, a SQL Injection vulnerability allows an unauthenticated attacker to retrieve the users encrypted password. |
94.5% | 2024-08-29 | |
|
CVE-2024-40766
KEV
|
9.8 CRITICAL |
An improper access control vulnerability has been identified in the SonicWall SonicOS management access, potentially leading to unauthorized resource access and in specific conditions, causing the firewall to crash. This issue affects SonicWall Firewall Gen 5 and Gen 6 devices, as well as Gen 7 devices running SonicOS 7.0.1-5035 and older versions. |
3.4% | 2024-08-23 | |
|
CVE-2024-39717
KEV
|
7.2 HIGH |
The Versa Director GUI provides an option to customize the look and feel of the user interface. This option is only available for a user logged with Provider-Data-Center-Admin or Provider-Data-Center-System-Admin. (Tenant level users do not have this privilege). The “Change Favicon” (Favorite Icon) option can be mis-used to upload a malicious file ending with .png extension to masquerade as image file. This is possible only after a user with Provider-Data-Center-Admin or Provider-Data-Center-System-Admin has successfully authenticated and logged in. |
4.6% | 2024-08-22 | |
|
CVE-2024-28987
KEV
|
9.1 CRITICAL |
The SolarWinds Web Help Desk (WHD) software is affected by a hardcoded credential vulnerability, allowing remote unauthenticated user to access internal functionality and modify data. |
94.3% | 2024-08-21 | |
|
CVE-2024-7971
KEV
|
9.6 CRITICAL |
Type confusion in V8 in Google Chrome prior to 128.0.6613.84 allowed a remote attacker to exploit heap corruption via a crafted HTML page. (Chromium security severity: High) |
1.5% | 2024-08-21 | |
|
CVE-2024-7965
KEV
|
8.8 HIGH |
Inappropriate implementation in V8 in Google Chrome prior to 128.0.6613.84 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) |
26.8% | 2024-08-21 | |
|
CVE-2024-7262
KEV
|
7.8 HIGH |
Improper path validation in promecefpluginhost.exe in Kingsoft WPS Office version ranging from 12.2.0.13110 to 12.2.0.16412 (exclusive) on Windows allows an attacker to load an arbitrary Windows library. The vulnerability was found weaponized as a single-click exploit in the form of a deceptive spreadsheet document |
12.4% | 2024-08-15 | |
|
CVE-2024-28986
KEV
|
9.8 CRITICAL |
SolarWinds Web Help Desk was found to be susceptible to a Java Deserialization Remote Code Execution vulnerability that, if exploited, would allow an attacker to run commands on the host machine. While it was reported as an unauthenticated vulnerability, SolarWinds has been unable to reproduce it without authentication after thorough testing. However, out of an abundance of caution, we recommend all Web Help Desk customers apply the patch, which is now available. |
75.0% | 2024-08-13 | |
|
CVE-2024-7593
KEV
|
9.8 CRITICAL |
Incorrect implementation of an authentication algorithm in Ivanti vTM other than versions 22.2R1 or 22.7R2 allows a remote unauthenticated attacker to bypass authentication of the admin panel. |
94.4% | 2024-08-13 | |
|
CVE-2024-38213
KEV
|
6.5 MEDIUM |
Windows Mark of the Web Security Feature Bypass Vulnerability |
59.3% | 2024-08-13 | |
|
CVE-2024-38193
KEV
|
7.8 HIGH |
Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability |
74.8% | 2024-08-13 | |
|
CVE-2024-38189
KEV
|
8.8 HIGH |
Microsoft Project Remote Code Execution Vulnerability |
43.7% | 2024-08-13 | |
|
CVE-2024-38178
KEV
|
7.5 HIGH |
Scripting Engine Memory Corruption Vulnerability |
30.2% | 2024-08-13 | |
|
CVE-2024-38107
KEV
|
7.8 HIGH |
Windows Power Dependency Coordinator Elevation of Privilege Vulnerability |
3.4% | 2024-08-13 | |
|
CVE-2024-38106
KEV
|
7.0 HIGH |
Windows Kernel Elevation of Privilege Vulnerability |
0.8% | 2024-08-13 | |
|
CVE-2024-41710
KEV
|
7.2 HIGH |
A vulnerability in the Mitel 6800 Series, 6900 Series, and 6900w Series SIP Phones, including the 6970 Conference Unit, through R6.4.0.HF1 (R6.4.0.136) could allow an authenticated attacker with administrative privilege to conduct an argument injection attack, due to insufficient parameter sanitization during the boot process. A successful exploit could allow an attacker to execute arbitrary commands within the context of the system. |
19.7% | 2024-08-12 |