cveID
stringlengths 13
16
| vendorProject
stringclasses 187
values | product
stringlengths 2
179
| vulnerabilityName
stringlengths 30
136
| dateAdded
stringclasses 232
values | shortDescription
stringlengths 55
567
| requiredAction
stringclasses 28
values | dueDate
stringlengths 10
10
| knownRansomwareCampaignUse
stringclasses 2
values | notes
stringlengths 46
505
| cwes
stringclasses 185
values |
|---|---|---|---|---|---|---|---|---|---|---|
CVE-2024-37383
|
Roundcube
|
Webmail
|
RoundCube Webmail Cross-Site Scripting (XSS) Vulnerability
|
2024-10-24
|
RoundCube Webmail contains a cross-site scripting (XSS) vulnerability in the handling of SVG animate attributes that allows a remote attacker to run malicious JavaScript code.
|
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
|
2024-11-14
|
Unknown
|
https://github.com/roundcube/roundcubemail/releases/tag/1.5.7, https://github.com/roundcube/roundcubemail/releases/tag/1.6.7 ; https://nvd.nist.gov/vuln/detail/CVE-2024-37383
|
CWE-79
|
CVE-2024-20481
|
Cisco
|
Adaptive Security Appliance (ASA) and Firepower Threat Defense (FTD)
|
Cisco ASA and FTD Denial-of-Service Vulnerability
|
2024-10-24
|
Cisco Adaptive Security Appliance (ASA) and Firepower Threat Defense (FTD) contain a missing release of resource after effective lifetime vulnerability that could allow an unauthenticated, remote attacker to cause a denial-of-service (DoS) of the RAVPN service.
|
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
|
2024-11-14
|
Unknown
|
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-bf-dos-vDZhLqrW ; https://nvd.nist.gov/vuln/detail/CVE-2024-20481
|
CWE-772
|
CVE-2024-47575
|
Fortinet
|
FortiManager
|
Fortinet FortiManager Missing Authentication Vulnerability
|
2024-10-23
|
Fortinet FortiManager contains a missing authentication vulnerability in the fgfmd daemon that allows a remote, unauthenticated attacker to execute arbitrary code or commands via specially crafted requests.
|
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
|
2024-11-13
|
Unknown
|
https://fortiguard.fortinet.com/psirt/FG-IR-24-423 ; https://nvd.nist.gov/vuln/detail/CVE-2024-47575
|
CWE-306
|
CVE-2024-38094
|
Microsoft
|
SharePoint
|
Microsoft SharePoint Deserialization Vulnerability
|
2024-10-22
|
Microsoft SharePoint contains a deserialization vulnerability that allows for remote code execution.
|
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
|
2024-11-12
|
Unknown
|
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38094 ; https://nvd.nist.gov/vuln/detail/CVE-2024-38094
|
CWE-502
|
CVE-2024-9537
|
ScienceLogic
|
SL1
|
ScienceLogic SL1 Unspecified Vulnerability
|
2024-10-21
|
ScienceLogic SL1 (formerly EM7) is affected by an unspecified vulnerability involving an unspecified third-party component.
|
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
|
2024-11-11
|
Unknown
|
https://support.sciencelogic.com/s/article/15527 ; https://nvd.nist.gov/vuln/detail/CVE-2024-9537
| null |
CVE-2024-40711
|
Veeam
|
Backup & Replication
|
Veeam Backup and Replication Deserialization Vulnerability
|
2024-10-17
|
Veeam Backup and Replication contains a deserialization vulnerability allowing an unauthenticated user to perform remote code execution.
|
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
|
2024-11-07
|
Known
|
https://www.veeam.com/kb4649 ; https://nvd.nist.gov/vuln/detail/CVE-2024-40711
|
CWE-502
|
CVE-2024-28987
|
SolarWinds
|
Web Help Desk
|
SolarWinds Web Help Desk Hardcoded Credential Vulnerability
|
2024-10-15
|
SolarWinds Web Help Desk contains a hardcoded credential vulnerability that could allow a remote, unauthenticated user to access internal functionality and modify data.
|
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
|
2024-11-05
|
Unknown
|
https://www.solarwinds.com/trust-center/security-advisories/cve-2024-28987 ; https://nvd.nist.gov/vuln/detail/CVE-2024-28987
|
CWE-798
|
CVE-2024-9680
|
Mozilla
|
Firefox
|
Mozilla Firefox Use-After-Free Vulnerability
|
2024-10-15
|
Mozilla Firefox and Firefox ESR contain a use-after-free vulnerability in Animation timelines that allows for code execution in the content process.
|
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
|
2024-11-05
|
Unknown
|
https://www.mozilla.org/en-US/security/advisories/mfsa2024-51/ ; https://nvd.nist.gov/vuln/detail/CVE-2024-9680
|
CWE-416
|
CVE-2024-30088
|
Microsoft
|
Windows
|
Microsoft Windows Kernel TOCTOU Race Condition Vulnerability
|
2024-10-15
|
Microsoft Windows Kernel contains a time-of-check to time-of-use (TOCTOU) race condition vulnerability that could allow for privilege escalation.
|
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
|
2024-11-05
|
Unknown
|
https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2024-30088 ; https://nvd.nist.gov/vuln/detail/CVE-2024-30088
|
CWE-367
|
CVE-2024-9380
|
Ivanti
|
Cloud Services Appliance (CSA)
|
Ivanti Cloud Services Appliance (CSA) OS Command Injection Vulnerability
|
2024-10-09
|
Ivanti Cloud Services Appliance (CSA) contains an OS command injection vulnerability in the administrative console which can allow an authenticated attacker with application admin privileges to pass commands to the underlying OS.
|
As Ivanti CSA 4.6.x has reached End-of-Life status, users are urged to remove CSA 4.6.x from service or upgrade to the 5.0.x line, or later, of supported solution.
|
2024-10-30
|
Unknown
|
https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-CSA-Cloud-Services-Appliance-CVE-2024-9379-CVE-2024-9380-CVE-2024-9381 ; https://nvd.nist.gov/vuln/detail/CVE-2024-9380
|
CWE-77
|
CVE-2024-9379
|
Ivanti
|
Cloud Services Appliance (CSA)
|
Ivanti Cloud Services Appliance (CSA) SQL Injection Vulnerability
|
2024-10-09
|
Ivanti Cloud Services Appliance (CSA) contains a SQL injection vulnerability in the admin web console in versions prior to 5.0.2, which can allow a remote attacker authenticated as administrator to run arbitrary SQL statements.
|
As Ivanti CSA 4.6.x has reached End-of-Life status, users are urged to remove CSA 4.6.x from service or upgrade to the 5.0.x line, or later, of supported solution.
|
2024-10-30
|
Unknown
|
https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-CSA-Cloud-Services-Appliance-CVE-2024-9379-CVE-2024-9380-CVE-2024-9381 ; https://nvd.nist.gov/vuln/detail/CVE-2024-9379
|
CWE-89
|
CVE-2024-23113
|
Fortinet
|
Multiple Products
|
Fortinet Multiple Products Format String Vulnerability
|
2024-10-09
|
Fortinet FortiOS, FortiPAM, FortiProxy, and FortiWeb contain a format string vulnerability that allows a remote, unauthenticated attacker to execute arbitrary code or commands via specially crafted requests.
|
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
|
2024-10-30
|
Unknown
|
https://www.fortiguard.com/psirt/FG-IR-24-029 ; https://nvd.nist.gov/vuln/detail/CVE-2024-23113
|
CWE-134
|
CVE-2024-43573
|
Microsoft
|
Windows
|
Microsoft Windows MSHTML Platform Spoofing Vulnerability
|
2024-10-08
|
Microsoft Windows MSHTML Platform contains an unspecified spoofing vulnerability which can lead to a loss of confidentiality.
|
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
|
2024-10-29
|
Unknown
|
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43573 ; https://nvd.nist.gov/vuln/detail/CVE-2024-43573
| null |
CVE-2024-43572
|
Microsoft
|
Windows
|
Microsoft Windows Management Console Remote Code Execution Vulnerability
|
2024-10-08
|
Microsoft Windows Management Console contains unspecified vulnerability that allows for remote code execution.
|
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
|
2024-10-29
|
Unknown
|
https://msrc.microsoft.com/update-guide/advisory/CVE-2024-43572 ; https://nvd.nist.gov/vuln/detail/CVE-2024-43572
| null |
CVE-2024-43047
|
Qualcomm
|
Multiple Chipsets
|
Qualcomm Multiple Chipsets Use-After-Free Vulnerability
|
2024-10-08
|
Multiple Qualcomm chipsets contain a use-after-free vulnerability due to memory corruption in DSP Services while maintaining memory maps of HLOS memory.
|
Apply remediations or mitigations per vendor instructions or discontinue use of the product if remediation or mitigations are unavailable.
|
2024-10-29
|
Unknown
|
https://git.codelinaro.org/clo/la/platform/vendor/qcom/opensource/dsp-kernel/-/commit/0e27b6c7d2bd8d0453e4465ac2ca49a8f8c440e2 ; https://nvd.nist.gov/vuln/detail/CVE-2024-43047
|
CWE-416
|
CVE-2024-45519
|
Synacor
|
Zimbra Collaboration
|
Synacor Zimbra Collaboration Command Execution Vulnerability
|
2024-10-03
|
Synacor Zimbra Collaboration contains an unspecified vulnerability in the postjournal service that may allow an unauthenticated user to execute commands.
|
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
|
2024-10-24
|
Unknown
|
https://wiki.zimbra.com/wiki/Zimbra_Security_Advisories ; https://nvd.nist.gov/vuln/detail/CVE-2024-45519
| null |
CVE-2024-29824
|
Ivanti
|
Endpoint Manager (EPM)
|
Ivanti Endpoint Manager (EPM) SQL Injection Vulnerability
|
2024-10-02
|
Ivanti Endpoint Manager (EPM) contains a SQL injection vulnerability in Core server that allows an unauthenticated attacker within the same network to execute arbitrary code.
|
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
|
2024-10-23
|
Unknown
|
https://forums.ivanti.com/s/article/Security-Advisory-May-2024 ; https://nvd.nist.gov/vuln/detail/CVE-2024-29824
|
CWE-89
|
CVE-2019-0344
|
SAP
|
Commerce Cloud
|
SAP Commerce Cloud Deserialization of Untrusted Data Vulnerability
|
2024-09-30
|
SAP Commerce Cloud (formerly known as Hybris) contains a deserialization of untrusted data vulnerability within the mediaconversion and virtualjdbc extension that allows for code injection.
|
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
|
2024-10-21
|
Unknown
|
https://web.archive.org/web/20191214053020/https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=523998017 ; https://nvd.nist.gov/vuln/detail/CVE-2019-0344
|
CWE-502
|
CVE-2021-4043
|
Motion Spell
|
GPAC
|
Motion Spell GPAC Null Pointer Dereference Vulnerability
|
2024-09-30
|
Motion Spell GPAC contains a null pointer dereference vulnerability that could allow a local attacker to cause a denial-of-service (DoS) condition.
|
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
|
2024-10-21
|
Unknown
|
This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. For more information, please see: https://github.com/gpac/gpac/commit/64a2e1b799352ac7d7aad1989bc06e7b0f2b01db ; https://nvd.nist.gov/vuln/detail/CVE-2021-4043
|
CWE-476
|
CVE-2020-15415
|
DrayTek
|
Multiple Vigor Routers
|
DrayTek Multiple Vigor Routers OS Command Injection Vulnerability
|
2024-09-30
|
DrayTek Vigor3900, Vigor2960, and Vigor300B devices contain an OS command injection vulnerability in cgi-bin/mainfunction.cgi/cvmcfgupload that allows for remote code execution via shell metacharacters in a filename when the text/x-python-script content type is used.
|
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
|
2024-10-21
|
Unknown
|
https://www.draytek.com/about/security-advisory/vigor3900-/-vigor2960-/-vigor300b-remote-code-injection/execution-vulnerability-(cve-2020-14472) ; https://nvd.nist.gov/vuln/detail/CVE-2020-15415
|
CWE-78
|
CVE-2023-25280
|
D-Link
|
DIR-820 Router
|
D-Link DIR-820 Router OS Command Injection Vulnerability
|
2024-09-30
|
D-Link DIR-820 routers contain an OS command injection vulnerability that allows a remote, unauthenticated attacker to escalate privileges to root via a crafted payload with the ping_addr parameter to ping.ccp.
|
The impacted product is end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue utilization of the product.
|
2024-10-21
|
Unknown
|
https://supportannouncement.us.dlink.com/security/publication.aspx?name=SAP10358 ; https://nvd.nist.gov/vuln/detail/CVE-2023-25280
|
CWE-78
|
CVE-2024-7593
|
Ivanti
|
Virtual Traffic Manager
|
Ivanti Virtual Traffic Manager Authentication Bypass Vulnerability
|
2024-09-24
|
Ivanti Virtual Traffic Manager contains an authentication bypass vulnerability that allows a remote, unauthenticated attacker to create a chosen administrator account.
|
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
|
2024-10-15
|
Unknown
|
https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Virtual-Traffic-Manager-vTM-CVE-2024-7593 ; https://nvd.nist.gov/vuln/detail/CVE-2024-7593
|
CWE-287, CWE-303
|
CVE-2024-8963
|
Ivanti
|
Cloud Services Appliance (CSA)
|
Ivanti Cloud Services Appliance (CSA) Path Traversal Vulnerability
|
2024-09-19
|
Ivanti Cloud Services Appliance (CSA) contains a path traversal vulnerability that could allow a remote, unauthenticated attacker to access restricted functionality. If CVE-2024-8963 is used in conjunction with CVE-2024-8190, an attacker could bypass admin authentication and execute arbitrary commands on the appliance.
|
As Ivanti CSA has reached End-of-Life status, users are urged to remove CSA 4.6.x from service or upgrade to the 5.0.x line of supported solutions, as future vulnerabilities on the 4.6.x version of CSA are unlikely to receive security updates.
|
2024-10-10
|
Unknown
|
https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-CSA-4-6-Cloud-Services-Appliance-CVE-2024-8963 ; https://nvd.nist.gov/vuln/detail/CVE-2024-8963
|
CWE-22
|
CVE-2020-14644
|
Oracle
|
WebLogic Server
|
Oracle WebLogic Server Remote Code Execution Vulnerability
|
2024-09-18
|
Oracle WebLogic Server, a product within the Fusion Middleware suite, contains a deserialization vulnerability. Unauthenticated attackers with network access via T3 or IIOP can exploit this vulnerability to achieve remote code execution.
|
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
|
2024-10-09
|
Unknown
|
https://www.oracle.com/security-alerts/cpujul2020.html ; https://nvd.nist.gov/vuln/detail/CVE-2020-14644
| null |
CVE-2022-21445
|
Oracle
|
ADF Faces
|
Oracle ADF Faces Deserialization of Untrusted Data Vulnerability
|
2024-09-18
|
Oracle ADF Faces library, included with Oracle JDeveloper Distribution, contains a deserialization of untrusted data vulnerability leading to unauthenticated remote code execution.
|
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
|
2024-10-09
|
Unknown
|
https://www.oracle.com/security-alerts/cpuapr2022.html ; https://nvd.nist.gov/vuln/detail/CVE-2022-21445
| null |
CVE-2020-0618
|
Microsoft
|
SQL Server
|
Microsoft SQL Server Reporting Services Remote Code Execution Vulnerability
|
2024-09-18
|
Microsoft SQL Server Reporting Services contains a deserialization vulnerability when handling page requests incorrectly. An authenticated attacker can exploit this vulnerability to execute code in the context of the Report Server service account.
|
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
|
2024-10-09
|
Unknown
|
https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2020-0618 ; https://nvd.nist.gov/vuln/detail/CVE-2020-0618
| null |
CVE-2024-27348
|
Apache
|
HugeGraph-Server
|
Apache HugeGraph-Server Improper Access Control Vulnerability
|
2024-09-18
|
Apache HugeGraph-Server contains an improper access control vulnerability that could allow a remote attacker to execute arbitrary code.
|
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
|
2024-10-09
|
Unknown
|
This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. For more information, please see: https://lists.apache.org/thread/nx6g6htyhpgtzsocybm242781o8w5kq9 ; https://nvd.nist.gov/vuln/detail/CVE-2024-27348
|
CWE-284
|
CVE-2014-0502
|
Adobe
|
Flash Player
|
Adobe Flash Player Double Free Vulnerablity
|
2024-09-17
|
Adobe Flash Player contains a double free vulnerability that allows a remote attacker to execute arbitrary code.
|
The impacted product is end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue utilization of the product.
|
2024-10-08
|
Unknown
|
https://www.adobe.com/products/flashplayer/end-of-life-alternative.html#eol-alternative-faq ; https://nvd.nist.gov/vuln/detail/CVE-2014-0502
|
CWE-399
|
CVE-2013-0648
|
Adobe
|
Flash Player
|
Adobe Flash Player Code Execution Vulnerability
|
2024-09-17
|
Adobe Flash Player contains an unspecified vulnerability in the ExternalInterface ActionScript functionality that allows a remote attacker to execute arbitrary code via crafted SWF content.
|
The impacted product is end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue utilization of the product.
|
2024-10-08
|
Unknown
|
https://www.adobe.com/products/flashplayer/end-of-life-alternative.html#eol-alternative-faq ; https://nvd.nist.gov/vuln/detail/CVE-2013-0648
| null |
CVE-2013-0643
|
Adobe
|
Flash Player
|
Adobe Flash Player Incorrect Default Permissions Vulnerability
|
2024-09-17
|
Adobe Flash Player contains an incorrect default permissions vulnerability in the Firefox sandbox that allows a remote attacker to execute arbitrary code via crafted SWF content.
|
The impacted product is end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue utilization of the product.
|
2024-10-08
|
Unknown
|
https://www.adobe.com/products/flashplayer/end-of-life-alternative.html#eol-alternative-faq ; https://nvd.nist.gov/vuln/detail/CVE-2013-0643
|
CWE-264
|
CVE-2014-0497
|
Adobe
|
Flash Player
|
Adobe Flash Player Integer Underflow Vulnerablity
|
2024-09-17
|
Adobe Flash Player contains an integer underflow vulnerability that allows a remote attacker to execute arbitrary code.
|
The impacted product is end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue utilization of the product.
|
2024-10-08
|
Unknown
|
https://www.adobe.com/products/flashplayer/end-of-life-alternative.html#eol-alternative-faq ; https://nvd.nist.gov/vuln/detail/CVE-2014-0497
|
CWE-191
|
CVE-2024-6670
|
Progress
|
WhatsUp Gold
|
Progress WhatsUp Gold SQL Injection Vulnerability
|
2024-09-16
|
Progress WhatsUp Gold contains a SQL injection vulnerability that allows an unauthenticated attacker to retrieve the user's encrypted password if the application is configured with only a single user.
|
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
|
2024-10-07
|
Known
|
https://community.progress.com/s/article/WhatsUp-Gold-Security-Bulletin-August-2024 ; https://nvd.nist.gov/vuln/detail/CVE-2024-6670
|
CWE-89
|
CVE-2024-43461
|
Microsoft
|
Windows
|
Microsoft Windows MSHTML Platform Spoofing Vulnerability
|
2024-09-16
|
Microsoft Windows MSHTML Platform contains a user interface (UI) misrepresentation of critical information vulnerability that allows an attacker to spoof a web page. This vulnerability was exploited in conjunction with CVE-2024-38112.
|
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
|
2024-10-07
|
Unknown
|
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43461 ; https://nvd.nist.gov/vuln/detail/CVE-2024-43461
|
CWE-451
|
CVE-2024-8190
|
Ivanti
|
Cloud Services Appliance
|
Ivanti Cloud Services Appliance OS Command Injection Vulnerability
|
2024-09-13
|
Ivanti Cloud Services Appliance (CSA) contains an OS command injection vulnerability in the administrative console which can allow an authenticated attacker with application admin privileges to pass commands to the underlying OS.
|
As Ivanti CSA has reached End-of-Life status, users are urged to remove CSA 4.6.x from service or upgrade to the 5.0.x line of supported solutions, as future vulnerabilities on the 4.6.x version of CSA are unlikely to receive future security updates.
|
2024-10-04
|
Unknown
|
https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Cloud-Service-Appliance-CSA-CVE-2024-8190; https://nvd.nist.gov/vuln/detail/CVE-2024-8190
|
CWE-78
|
CVE-2024-38217
|
Microsoft
|
Windows
|
Microsoft Windows Mark of the Web (MOTW) Protection Mechanism Failure Vulnerability
|
2024-09-10
|
Microsoft Windows Mark of the Web (MOTW) contains a protection mechanism failure vulnerability that allows an attacker to bypass MOTW-based defenses. This can result in a limited loss of integrity and availability of security features such as Protected View in Microsoft Office, which rely on MOTW tagging.
|
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
|
2024-10-01
|
Unknown
|
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38217; https://nvd.nist.gov/vuln/detail/CVE-2024-38217
|
CWE-693
|
CVE-2024-38014
|
Microsoft
|
Windows
|
Microsoft Windows Installer Improper Privilege Management Vulnerability
|
2024-09-10
|
Microsoft Windows Installer contains an improper privilege management vulnerability that could allow an attacker to gain SYSTEM privileges.
|
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
|
2024-10-01
|
Unknown
|
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38014; https://nvd.nist.gov/vuln/detail/CVE-2024-38014
|
CWE-269
|
CVE-2024-38226
|
Microsoft
|
Publisher
|
Microsoft Publisher Protection Mechanism Failure Vulnerability
|
2024-09-10
|
Microsoft Publisher contains a protection mechanism failure vulnerability that allows attacker to bypass Office macro policies used to block untrusted or malicious files.
|
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
|
2024-10-01
|
Unknown
|
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38226; https://nvd.nist.gov/vuln/detail/CVE-2024-38226
|
CWE-693
|
CVE-2024-40766
|
SonicWall
|
SonicOS
|
SonicWall SonicOS Improper Access Control Vulnerability
|
2024-09-09
|
SonicWall SonicOS contains an improper access control vulnerability that could lead to unauthorized resource access and, under certain conditions, may cause the firewall to crash.
|
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
|
2024-09-30
|
Unknown
|
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2024-0015; https://nvd.nist.gov/vuln/detail/CVE-2024-40766
|
CWE-284
|
CVE-2017-1000253
|
Linux
|
Kernel
|
Linux Kernel PIE Stack Buffer Corruption Vulnerability
|
2024-09-09
|
Linux kernel contains a position-independent executable (PIE) stack buffer corruption vulnerability in load_elf_ binary() that allows a local attacker to escalate privileges.
|
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
|
2024-09-30
|
Known
|
This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. For more information, please see: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a87938b2e246b81b4fb713edb371a9fa3c5c3c86; https://nvd.nist.gov/vuln/detail/CVE-2017-1000253
|
CWE-119
|
CVE-2016-3714
|
ImageMagick
|
ImageMagick
|
ImageMagick Improper Input Validation Vulnerability
|
2024-09-09
|
ImageMagick contains an improper input validation vulnerability that affects the EPHEMERAL, HTTPS, MVG, MSL, TEXT, SHOW, WIN, and PLT coders. This allows a remote attacker to execute arbitrary code via shell metacharacters in a crafted image.
|
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
|
2024-09-30
|
Unknown
|
This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. For more information, please see: https://www.imagemagick.org/discourse-server/viewtopic.php?f=4&t=29588#p132726, https://imagemagick.org/archive/releases/; https://nvd.nist.gov/vuln/detail/CVE-2016-3714
|
CWE-20
|
CVE-2024-7262
|
Kingsoft
|
WPS Office
|
Kingsoft WPS Office Path Traversal Vulnerability
|
2024-09-03
|
Kingsoft WPS Office contains a path traversal vulnerability in promecefpluginhost.exe on Windows that allows an attacker to load an arbitrary Windows library.
|
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
|
2024-09-24
|
Unknown
|
While CISA cannot confirm the effectiveness of patches at this time, it is recommended that mitigations be applied per vendor instructions if available. If these instructions cannot be located or if mitigations are unavailable, discontinue the use of the product.; https://nvd.nist.gov/vuln/detail/CVE-2024-7262
|
CWE-22
|
CVE-2021-20124
|
DrayTek
|
VigorConnect
|
Draytek VigorConnect Path Traversal Vulnerability
|
2024-09-03
|
Draytek VigorConnect contains a path traversal vulnerability in the file download functionality of the WebServlet endpoint. An unauthenticated attacker could leverage this vulnerability to download arbitrary files from the underlying operating system with root privileges.
|
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
|
2024-09-24
|
Unknown
|
https://www.draytek.com/about/security-advisory/vigorconnect-software-security-vulnerability-(cve-2021-20123-cve-2021-20129); https://nvd.nist.gov/vuln/detail/CVE-2021-20124
|
CWE-22
|
CVE-2021-20123
|
DrayTek
|
VigorConnect
|
Draytek VigorConnect Path Traversal Vulnerability
|
2024-09-03
|
Draytek VigorConnect contains a path traversal vulnerability in the DownloadFileServlet endpoint. An unauthenticated attacker could leverage this vulnerability to download arbitrary files from the underlying operating system with root privileges.
|
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
|
2024-09-24
|
Unknown
|
https://www.draytek.com/about/security-advisory/vigorconnect-software-security-vulnerability-(cve-2021-20123-cve-2021-20129); https://nvd.nist.gov/vuln/detail/CVE-2021-20123
|
CWE-22
|
CVE-2024-7965
|
Google
|
Chromium V8
|
Google Chromium V8 Inappropriate Implementation Vulnerability
|
2024-08-28
|
Google Chromium V8 contains an inappropriate implementation vulnerability that allows a remote attacker to potentially exploit heap corruption via a crafted HTML page. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera.
|
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
|
2024-09-18
|
Unknown
|
https://chromereleases.googleblog.com/2024/08/stable-channel-update-for-desktop_21.html; https://nvd.nist.gov/vuln/detail/CVE-2024-7965
|
CWE-358
|
CVE-2024-38856
|
Apache
|
OFBiz
|
Apache OFBiz Incorrect Authorization Vulnerability
|
2024-08-27
|
Apache OFBiz contains an incorrect authorization vulnerability that could allow remote code execution via a Groovy payload in the context of the OFBiz user process by an unauthenticated attacker.
|
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
|
2024-09-17
|
Unknown
|
This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. Please check with specific vendors for information on patching status. For more information, please see: https://lists.apache.org/thread/olxxjk6b13sl3wh9cmp0k2dscvp24l7w; https://nvd.nist.gov/vuln/detail/CVE-2024-38856
|
CWE-863
|
CVE-2024-7971
|
Google
|
Chromium V8
|
Google Chromium V8 Type Confusion Vulnerability
|
2024-08-26
|
Google Chromium V8 contains a type confusion vulnerability that allows a remote attacker to exploit heap corruption via a crafted HTML page. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera.
|
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
|
2024-09-16
|
Unknown
|
https://chromereleases.googleblog.com/2024/08/stable-channel-update-for-desktop_21.html; https://nvd.nist.gov/vuln/detail/CVE-2024-7971
|
CWE-843
|
CVE-2024-39717
|
Versa
|
Director
|
Versa Director Dangerous File Type Upload Vulnerability
|
2024-08-23
|
The Versa Director GUI contains an unrestricted upload of file with dangerous type vulnerability that allows administrators with Provider-Data-Center-Admin or Provider-Data-Center-System-Admin privileges to customize the user interface. The “Change Favicon” (Favorite Icon) enables the upload of a .png file, which can be exploited to upload a malicious file with a .png extension disguised as an image.
|
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
|
2024-09-13
|
Unknown
|
https://versa-networks.com/blog/versa-security-bulletin-update-on-cve-2024-39717-versa-director-dangerous-file-type-upload-vulnerability/; https://nvd.nist.gov/vuln/detail/CVE-2024-39717
|
CWE-434
|
CVE-2021-31196
|
Microsoft
|
Exchange Server
|
Microsoft Exchange Server Information Disclosure Vulnerability
|
2024-08-21
|
Microsoft Exchange Server contains an information disclosure vulnerability that allows for remote code execution.
|
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
|
2024-09-11
|
Unknown
|
https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2021-31196; https://nvd.nist.gov/vuln/detail/CVE-2021-31196
| null |
CVE-2022-0185
|
Linux
|
Kernel
|
Linux Kernel Heap-Based Buffer Overflow Vulnerability
|
2024-08-21
|
Linux kernel contains a heap-based buffer overflow vulnerability in the legacy_parse_param function in the Filesystem Context functionality. This allows an attacker to open a filesystem that does not support the Filesystem Context API and ultimately escalate privileges.
|
Apply updates per vendor instructions or discontinue use of the product if updates are unavailable.
|
2024-09-11
|
Unknown
|
This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. For more information, please see: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=722d94847de2; https://nvd.nist.gov/vuln/detail/CVE-2022-0185
|
CWE-190
|
CVE-2021-33045
|
Dahua
|
IP Camera Firmware
|
Dahua IP Camera Authentication Bypass Vulnerability
|
2024-08-21
|
Dahua IP cameras and related products contain an authentication bypass vulnerability when the loopback device is specified by the client during authentication.
|
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
|
2024-09-11
|
Unknown
|
https://www.dahuasecurity.com/aboutUs/trustedCenter/details/582; https://nvd.nist.gov/vuln/detail/CVE-2021-33045
|
CWE-287
|
CVE-2021-33044
|
Dahua
|
IP Camera Firmware
|
Dahua IP Camera Authentication Bypass Vulnerability
|
2024-08-21
|
Dahua IP cameras and related products contain an authentication bypass vulnerability when the NetKeyboard type argument is specified by the client during authentication.
|
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
|
2024-09-11
|
Unknown
|
https://www.dahuasecurity.com/aboutUs/trustedCenter/details/582; https://nvd.nist.gov/vuln/detail/CVE-2021-33044
|
CWE-287
|
CVE-2024-23897
|
Jenkins
|
Jenkins Command Line Interface (CLI)
|
Jenkins Command Line Interface (CLI) Path Traversal Vulnerability
|
2024-08-19
|
Jenkins Command Line Interface (CLI) contains a path traversal vulnerability that allows attackers limited read access to certain files, which can lead to code execution.
|
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
|
2024-09-09
|
Known
|
https://www.jenkins.io/security/advisory/2024-01-24/#SECURITY-3314; https://nvd.nist.gov/vuln/detail/CVE-2024-23897
|
CWE-27
|
CVE-2024-28986
|
SolarWinds
|
Web Help Desk
|
SolarWinds Web Help Desk Deserialization of Untrusted Data Vulnerability
|
2024-08-15
|
SolarWinds Web Help Desk contains a deserialization of untrusted data vulnerability that could allow for remote code execution.
|
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
|
2024-09-05
|
Unknown
|
https://www.solarwinds.com/trust-center/security-advisories/cve-2024-28986; https://nvd.nist.gov/vuln/detail/CVE-2024-28986
|
CWE-502
|
CVE-2024-38107
|
Microsoft
|
Windows
|
Microsoft Windows Power Dependency Coordinator Privilege Escalation Vulnerability
|
2024-08-13
|
Microsoft Windows Power Dependency Coordinator contains an unspecified vulnerability that allows for privilege escalation, enabling a local attacker to obtain SYSTEM privileges.
|
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
|
2024-09-03
|
Unknown
|
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38107; https://nvd.nist.gov/vuln/detail/CVE-2024-38107
|
CWE-416
|
CVE-2024-38106
|
Microsoft
|
Windows
|
Microsoft Windows Kernel Privilege Escalation Vulnerability
|
2024-08-13
|
Microsoft Windows Kernel contains an unspecified vulnerability that allows for privilege escalation, enabling a local attacker to gain SYSTEM privileges. Successful exploitation of this vulnerability requires an attacker to win a race condition.
|
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
|
2024-09-03
|
Unknown
|
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38106; https://nvd.nist.gov/vuln/detail/CVE-2024-38106
|
CWE-591
|
CVE-2024-38193
|
Microsoft
|
Windows
|
Microsoft Windows Ancillary Function Driver for WinSock Privilege Escalation Vulnerability
|
2024-08-13
|
Microsoft Windows Ancillary Function Driver for WinSock contains an unspecified vulnerability that allows for privilege escalation, enabling a local attacker to gain SYSTEM privileges.
|
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
|
2024-09-03
|
Unknown
|
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38193; https://nvd.nist.gov/vuln/detail/CVE-2024-38193
|
CWE-416
|
CVE-2024-38213
|
Microsoft
|
Windows
|
Microsoft Windows SmartScreen Security Feature Bypass Vulnerability
|
2024-08-13
|
Microsoft Windows SmartScreen contains a security feature bypass vulnerability that allows an attacker to bypass the SmartScreen user experience via a malicious file.
|
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
|
2024-09-03
|
Unknown
|
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38213; https://nvd.nist.gov/vuln/detail/CVE-2024-38213
|
CWE-693
|
CVE-2024-38178
|
Microsoft
|
Windows
|
Microsoft Windows Scripting Engine Memory Corruption Vulnerability
|
2024-08-13
|
Microsoft Windows Scripting Engine contains a memory corruption vulnerability that allows unauthenticated attacker to initiate remote code execution via a specially crafted URL.
|
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
|
2024-09-03
|
Unknown
|
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38178; https://nvd.nist.gov/vuln/detail/CVE-2024-38178
|
CWE-843
|
CVE-2024-38189
|
Microsoft
|
Project
|
Microsoft Project Remote Code Execution Vulnerability
|
2024-08-13
|
Microsoft Project contains an unspecified vulnerability that allows for remote code execution via a malicious file.
|
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
|
2024-09-03
|
Unknown
|
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38189; https://nvd.nist.gov/vuln/detail/CVE-2024-38189
|
CWE-20
|
CVE-2024-32113
|
Apache
|
OFBiz
|
Apache OFBiz Path Traversal Vulnerability
|
2024-08-07
|
Apache OFBiz contains a path traversal vulnerability that could allow for remote code execution.
|
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
|
2024-08-28
|
Unknown
|
This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. Please check with specific vendors for information on patching status. For more information, please see: https://lists.apache.org/thread/w6s60okgkxp2th1sr8vx0ndmgk68fqrd; https://nvd.nist.gov/vuln/detail/CVE-2024-32113
|
CWE-22
|
CVE-2024-36971
|
Android
|
Kernel
|
Android Kernel Remote Code Execution Vulnerability
|
2024-08-07
|
Android contains an unspecified vulnerability in the kernel that allows for remote code execution. This vulnerability resides in Linux Kernel and could impact other products, including but not limited to Android OS.
|
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
|
2024-08-28
|
Unknown
|
This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. Please check with specific vendors for information on patching status. For more information, please see: https://source.android.com/docs/security/bulletin/2024-08-01, https://lore.kernel.org/linux-cve-announce/[email protected]/T/#u ; https://nvd.nist.gov/vuln/detail/CVE-2024-36971
|
CWE-416
|
CVE-2018-0824
|
Microsoft
|
Windows
|
Microsoft COM for Windows Deserialization of Untrusted Data Vulnerability
|
2024-08-05
|
Microsoft COM for Windows contains a deserialization of untrusted data vulnerability that allows for privilege escalation and remote code execution via a specially crafted file or script.
|
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
|
2024-08-26
|
Unknown
|
https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2018-0824; https://nvd.nist.gov/vuln/detail/CVE-2018-0824
|
CWE-502
|
CVE-2024-37085
|
VMware
|
ESXi
|
VMware ESXi Authentication Bypass Vulnerability
|
2024-07-30
|
VMware ESXi contains an authentication bypass vulnerability. A malicious actor with sufficient Active Directory (AD) permissions can gain full access to an ESXi host that was previously configured to use AD for user management by re-creating the configured AD group ('ESXi Admins' by default) after it was deleted from AD.
|
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
|
2024-08-20
|
Known
|
https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/24505; https://nvd.nist.gov/vuln/detail/CVE-2024-37085
|
CWE-305
|
CVE-2023-45249
|
Acronis
|
Cyber Infrastructure (ACI)
|
Acronis Cyber Infrastructure (ACI) Insecure Default Password Vulnerability
|
2024-07-29
|
Acronis Cyber Infrastructure (ACI) allows an unauthenticated user to execute commands remotely due to the use of default passwords.
|
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
|
2024-08-19
|
Unknown
|
https://security-advisory.acronis.com/advisories/SEC-6452; https://nvd.nist.gov/vuln/detail/CVE-2023-45249
|
CWE-1393
|
CVE-2024-5217
|
ServiceNow
|
Utah, Vancouver, and Washington DC Now
|
ServiceNow Incomplete List of Disallowed Inputs Vulnerability
|
2024-07-29
|
ServiceNow Washington DC, Vancouver, and earlier Now Platform releases contain an incomplete list of disallowed inputs vulnerability in the GlideExpression script. An unauthenticated user could exploit this vulnerability to execute code remotely.
|
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
|
2024-08-19
|
Unknown
|
https://support.servicenow.com/kb?id=kb_article_view&sysparm_article=KB1648313; https://nvd.nist.gov/vuln/detail/CVE-2024-5217
|
CWE-184
|
CVE-2024-4879
|
ServiceNow
|
Utah, Vancouver, and Washington DC Now
|
ServiceNow Improper Input Validation Vulnerability
|
2024-07-29
|
ServiceNow Utah, Vancouver, and Washington DC Now releases contain a jelly template injection vulnerability in UI macros. An unauthenticated user could exploit this vulnerability to execute code remotely.
|
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
|
2024-08-19
|
Unknown
|
https://support.servicenow.com/kb?id=kb_article_view&sysparm_article=KB1645154; https://nvd.nist.gov/vuln/detail/CVE-2024-4879
|
CWE-1287
|
CVE-2024-39891
|
Twilio
|
Authy
|
Twilio Authy Information Disclosure Vulnerability
|
2024-07-23
|
Twilio Authy contains an information disclosure vulnerability in its API that allows an unauthenticated endpoint to accept a request containing a phone number and respond with information about whether the phone number was registered with Authy.
|
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
|
2024-08-13
|
Unknown
|
https://www.twilio.com/en-us/changelog/Security_Alert_Authy_App_Android_iOS; https://nvd.nist.gov/vuln/detail/CVE-2024-39891
|
CWE-203
|
CVE-2012-4792
|
Microsoft
|
Internet Explorer
|
Microsoft Internet Explorer Use-After-Free Vulnerability
|
2024-07-23
|
Microsoft Internet Explorer contains a use-after-free vulnerability that allows a remote attacker to execute arbitrary code via a crafted web site that triggers access to an object that (1) was not properly allocated or (2) is deleted, as demonstrated by a CDwnBindInfo object.
|
The impacted product is end-of-life and should be disconnected if still in use.
|
2024-08-13
|
Unknown
|
https://learn.microsoft.com/en-us/lifecycle/products/internet-explorer-11; https://nvd.nist.gov/vuln/detail/CVE-2012-4792
|
CWE-416
|
CVE-2022-22948
|
VMware
|
vCenter Server
|
VMware vCenter Server Incorrect Default File Permissions Vulnerability
|
2024-07-17
|
VMware vCenter Server contains an incorrect default file permissions vulnerability that allows a remote, privileged attacker to gain access to sensitive information.
|
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
|
2024-08-07
|
Unknown
|
https://www.vmware.com/security/advisories/VMSA-2022-0009.html; https://nvd.nist.gov/vuln/detail/CVE-2022-22948
|
CWE-276
|
CVE-2024-28995
|
SolarWinds
|
Serv-U
|
SolarWinds Serv-U Path Traversal Vulnerability
|
2024-07-17
|
SolarWinds Serv-U contains a path traversal vulnerability that allows an attacker access to read sensitive files on the host machine.
|
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
|
2024-08-07
|
Unknown
|
https://www.solarwinds.com/trust-center/security-advisories/cve-2024-28995; https://nvd.nist.gov/vuln/detail/CVE-2024-28995
|
CWE-22
|
CVE-2024-34102
|
Adobe
|
Commerce and Magento Open Source
|
Adobe Commerce and Magento Open Source Improper Restriction of XML External Entity Reference (XXE) Vulnerability
|
2024-07-17
|
Adobe Commerce and Magento Open Source contain an improper restriction of XML external entity reference (XXE) vulnerability that allows for remote code execution.
|
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
|
2024-08-07
|
Unknown
|
https://helpx.adobe.com/security/products/magento/apsb24-40.html; https://nvd.nist.gov/vuln/detail/CVE-2024-34102
|
CWE-611
|
CVE-2024-36401
|
OSGeo
|
GeoServer
|
OSGeo GeoServer GeoTools Eval Injection Vulnerability
|
2024-07-15
|
OSGeo GeoServer GeoTools contains an improper neutralization of directives in dynamically evaluated code vulnerability due to unsafely evaluating property names as XPath expressions. This allows unauthenticated attackers to conduct remote code execution via specially crafted input.
|
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
|
2024-08-05
|
Unknown
|
This vulnerability affects an open-source component, third-party library, or a protocol used by different products. For more information, please see: https://github.com/geoserver/geoserver/security/advisories/GHSA-6jj6-gm7p-fcvv, https://github.com/geotools/geotools/pull/4797 ; https://nvd.nist.gov/vuln/detail/CVE-2024-36401
|
CWE-95
|
CVE-2024-23692
|
Rejetto
|
HTTP File Server
|
Rejetto HTTP File Server Improper Neutralization of Special Elements Used in a Template Engine Vulnerability
|
2024-07-09
|
Rejetto HTTP File Server contains an improper neutralization of special elements used in a template engine vulnerability. This allows a remote, unauthenticated attacker to execute commands on the affected system by sending a specially crafted HTTP request.
|
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
|
2024-07-30
|
Unknown
|
The patched Rejetto HTTP File Server (HFS) is version 3: https://github.com/rejetto/hfs?tab=readme-ov-file#installation, https://www.rejetto.com/hfs/ ; https://nvd.nist.gov/vuln/detail/CVE-2024-23692
|
CWE-1336
|
CVE-2024-38080
|
Microsoft
|
Windows
|
Microsoft Windows Hyper-V Privilege Escalation Vulnerability
|
2024-07-09
|
Microsoft Windows Hyper-V contains a privilege escalation vulnerability that allows a local attacker with user permissions to gain SYSTEM privileges.
|
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
|
2024-07-30
|
Unknown
|
https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2024-38080; https://nvd.nist.gov/vuln/detail/CVE-2024-38080
|
CWE-190
|
CVE-2024-38112
|
Microsoft
|
Windows
|
Microsoft Windows MSHTML Platform Spoofing Vulnerability
|
2024-07-09
|
Microsoft Windows MSHTML Platform contains a spoofing vulnerability that has a high impact to confidentiality, integrity, and availability.
|
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
|
2024-07-30
|
Unknown
|
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38112; https://nvd.nist.gov/vuln/detail/CVE-2024-38112
|
CWE-451
|
CVE-2024-20399
|
Cisco
|
NX-OS
|
Cisco NX-OS Command Injection Vulnerability
|
2024-07-02
|
Cisco NX-OS contains a command injection vulnerability in the command line interface (CLI) that could allow an authenticated, local attacker to execute commands as root on the underlying operating system of an affected device.
|
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
|
2024-07-23
|
Unknown
|
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-cmd-injection-xD9OhyOP; https://nvd.nist.gov/vuln/detail/CVE-2024-20399
|
CWE-78
|
CVE-2020-13965
|
Roundcube
|
Webmail
|
Roundcube Webmail Cross-Site Scripting (XSS) Vulnerability
|
2024-06-26
|
Roundcube Webmail contains a cross-site scripting (XSS) vulnerability that allows a remote attacker to manipulate data via a malicious XML attachment.
|
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
|
2024-07-17
|
Unknown
|
https://roundcube.net/news/2020/06/02/security-updates-1.4.5-and-1.3.12; https://nvd.nist.gov/vuln/detail/CVE-2020-13965
|
CWE-80
|
CVE-2022-2586
|
Linux
|
Kernel
|
Linux Kernel Use-After-Free Vulnerability
|
2024-06-26
|
Linux Kernel contains a use-after-free vulnerability in the nft_object, allowing local attackers to escalate privileges.
|
Apply updates per vendor instructions or discontinue use of the product if updates are unavailable.
|
2024-07-17
|
Unknown
|
This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. For more information, please see: https://seclists.org/oss-sec/2022/q3/131; https://nvd.nist.gov/vuln/detail/CVE-2022-2586
|
CWE-416
|
CVE-2022-24816
|
OSGeo
|
JAI-EXT
|
OSGeo GeoServer JAI-EXT Code Injection Vulnerability
|
2024-06-26
|
OSGeo GeoServer JAI-EXT contains a code injection vulnerability that, when programs use jt-jiffle and allow Jiffle script to be provided via network request, could allow remote code execution.
|
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
|
2024-07-17
|
Unknown
|
This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. The patched JAI-EXT is version 1.1.22: https://github.com/geosolutions-it/jai-ext/releases/tag/1.1.22, https://github.com/geosolutions-it/jai-ext/security/advisories/GHSA-v92f-jx6p-73rx; https://nvd.nist.gov/vuln/detail/CVE-2022-24816
|
CWE-94
|
CVE-2024-4358
|
Progress
|
Telerik Report Server
|
Progress Telerik Report Server Authentication Bypass by Spoofing Vulnerability
|
2024-06-13
|
Progress Telerik Report Server contains an authorization bypass by spoofing vulnerability that allows an attacker to obtain unauthorized access.
|
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
|
2024-07-04
|
Unknown
|
https://docs.telerik.com/report-server/knowledge-base/registration-auth-bypass-cve-2024-4358; https://nvd.nist.gov/vuln/detail/CVE-2024-4358
|
CWE-290
|
CVE-2024-26169
|
Microsoft
|
Windows
|
Microsoft Windows Error Reporting Service Improper Privilege Management Vulnerability
|
2024-06-13
|
Microsoft Windows Error Reporting Service contains an improper privilege management vulnerability that allows a local attacker with user permissions to gain SYSTEM privileges.
|
Apply updates per vendor instructions or discontinue use of the product if updates are unavailable.
|
2024-07-04
|
Known
|
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26169; https://nvd.nist.gov/vuln/detail/CVE-2024-26169
|
CWE-269
|
CVE-2024-32896
|
Android
|
Pixel
|
Android Pixel Privilege Escalation Vulnerability
|
2024-06-13
|
Android Pixel contains an unspecified vulnerability in the firmware that allows for privilege escalation.
|
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
|
2024-07-04
|
Unknown
|
https://source.android.com/docs/security/bulletin/pixel/2024-06-01; https://nvd.nist.gov/vuln/detail/CVE-2024-32896
|
CWE-783
|
CVE-2024-4577
|
PHP Group
|
PHP
|
PHP-CGI OS Command Injection Vulnerability
|
2024-06-12
|
PHP, specifically Windows-based PHP used in CGI mode, contains an OS command injection vulnerability that allows for arbitrary code execution. This vulnerability is a patch bypass for CVE-2012-1823.
|
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
|
2024-07-03
|
Known
|
This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. Please check with specific vendors for information on patching status. For more information, please see: https://www.php.net/ChangeLog-8.php#; https://nvd.nist.gov/vuln/detail/CVE-2024-4577
|
CWE-78
|
CVE-2024-4610
|
Arm
|
Mali GPU Kernel Driver
|
Arm Mali GPU Kernel Driver Use-After-Free Vulnerability
|
2024-06-12
|
Arm Bifrost and Valhall GPU kernel drivers contain a use-after-free vulnerability that allows a local, non-privileged user to make improper GPU memory processing operations to gain access to already freed memory.
|
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
|
2024-07-03
|
Unknown
|
https://developer.arm.com/Arm%20Security%20Center/Mali%20GPU%20Driver%20Vulnerabilities; https://nvd.nist.gov/vuln/detail/CVE-2024-4610
|
CWE-416
|
CVE-2017-3506
|
Oracle
|
WebLogic Server
|
Oracle WebLogic Server OS Command Injection Vulnerability
|
2024-06-03
|
Oracle WebLogic Server, a product within the Fusion Middleware suite, contains an OS command injection vulnerability that allows an attacker to execute arbitrary code via a specially crafted HTTP request that includes a malicious XML document.
|
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
|
2024-06-24
|
Unknown
|
https://www.oracle.com/security-alerts/cpuapr2017.html; https://nvd.nist.gov/vuln/detail/CVE-2017-3506
|
CWE-78
|
CVE-2024-1086
|
Linux
|
Kernel
|
Linux Kernel Use-After-Free Vulnerability
|
2024-05-30
|
Linux kernel contains a use-after-free vulnerability in the netfilter: nf_tables component that allows an attacker to achieve local privilege escalation.
|
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
|
2024-06-20
|
Unknown
|
This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. Please check with specific vendors for information on patching status. For more information, please see: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f342de4e2f33e0e39165d8639387aa6c19dff660; https://nvd.nist.gov/vuln/detail/CVE-2024-1086
|
CWE-416
|
CVE-2024-24919
|
Check Point
|
Quantum Security Gateways
|
Check Point Quantum Security Gateways Information Disclosure Vulnerability
|
2024-05-30
|
Check Point Quantum Security Gateways contain an unspecified information disclosure vulnerability. The vulnerability potentially allows an attacker to access information on Gateways connected to the internet, with IPSec VPN, Remote Access VPN or Mobile Access enabled. This issue affects several product lines from Check Point, including CloudGuard Network, Quantum Scalable Chassis, Quantum Security Gateways, and Quantum Spark Appliances.
|
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
|
2024-06-20
|
Unknown
|
https://support.checkpoint.com/results/sk/sk182336; https://nvd.nist.gov/vuln/detail/CVE-2024-24919
|
CWE-200
|
CVE-2024-4978
|
Justice AV Solutions
|
Viewer
|
Justice AV Solutions (JAVS) Viewer Installer Embedded Malicious Code Vulnerability
|
2024-05-29
|
Justice AV Solutions (JAVS) Viewer installer contains a malicious version of ffmpeg.exe, named fffmpeg.exe (SHA256: 421a4ad2615941b177b6ec4ab5e239c14e62af2ab07c6df1741e2a62223223c4). When run, this creates a backdoor connection to a malicious C2 server.
|
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
|
2024-06-19
|
Unknown
|
Please follow the vendor’s instructions as outlined in the public statements at https://www.rapid7.com/blog/post/2024/05/23/cve-2024-4978-backdoored-justice-av-solutions-viewer-software-used-in-apparent-supply-chain-attack#remediation and https://www.javs.com/downloads; https://nvd.nist.gov/vuln/detail/CVE-2024-4978
|
CWE-506
|
CVE-2024-5274
|
Google
|
Chromium V8
|
Google Chromium V8 Type Confusion Vulnerability
|
2024-05-28
|
Google Chromium V8 contains a type confusion vulnerability that allows a remote attacker to execute code via a crafted HTML page. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera.
|
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
|
2024-06-18
|
Unknown
|
https://chromereleases.googleblog.com/2024/05/stable-channel-update-for-desktop_23.html?m=1; https://nvd.nist.gov/vuln/detail/CVE-2024-5274
|
CWE-843
|
CVE-2020-17519
|
Apache
|
Flink
|
Apache Flink Improper Access Control Vulnerability
|
2024-05-23
|
Apache Flink contains an improper access control vulnerability that allows an attacker to read any file on the local filesystem of the JobManager through its REST interface.
|
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
|
2024-06-13
|
Unknown
|
This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. Please check with specific vendors for information on patching status. For more information, please see: https://lists.apache.org/thread/typ0h03zyfrzjqlnb7plh64df1g2383d; https://nvd.nist.gov/vuln/detail/CVE-2020-17519
|
CWE-552
|
CVE-2024-4947
|
Google
|
Chromium V8
|
Google Chromium V8 Type Confusion Vulnerability
|
2024-05-20
|
Google Chromium V8 contains a type confusion vulnerability that allows a remote attacker to execute code via a crafted HTML page.
|
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
|
2024-06-10
|
Unknown
|
https://chromereleases.googleblog.com/2024/05/stable-channel-update-for-desktop_15.html; https://nvd.nist.gov/vuln/detail/CVE-2024-4947
|
CWE-843
|
CVE-2023-43208
|
NextGen Healthcare
|
Mirth Connect
|
NextGen Healthcare Mirth Connect Deserialization of Untrusted Data Vulnerability
|
2024-05-20
|
NextGen Healthcare Mirth Connect contains a deserialization of untrusted data vulnerability that allows for unauthenticated remote code execution via a specially crafted request.
|
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
|
2024-06-10
|
Unknown
|
This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. Please check with specific vendors for information on patching status. For more information, please see: https://github.com/nextgenhealthcare/connect/wiki/4.4.1---What%27s-New ; https://nvd.nist.gov/vuln/detail/CVE-2023-43208
|
CWE-502
|
CVE-2024-4761
|
Google
|
Chromium Visuals
|
Google Chromium V8 Out-of-Bounds Memory Write Vulnerability
|
2024-05-16
|
Google Chromium V8 Engine contains an unspecified out-of-bounds memory write vulnerability via a crafted HTML page. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera.
|
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
|
2024-06-06
|
Unknown
|
https://chromereleases.googleblog.com/2024/05/stable-channel-update-for-desktop_13.html; https://nvd.nist.gov/vuln/detail/CVE-2024-4761
|
CWE-787
|
CVE-2021-40655
|
D-Link
|
DIR-605 Router
|
D-Link DIR-605 Router Information Disclosure Vulnerability
|
2024-05-16
|
D-Link DIR-605 routers contain an information disclosure vulnerability that allows attackers to obtain a username and password by forging a post request to the /getcfg.php page.
|
This vulnerability affects legacy D-Link products. All associated hardware revisions have reached their end-of-life (EOL) or end-of-service (EOS) life cycle and should be retired and replaced per vendor instructions.
|
2024-06-06
|
Unknown
|
https://legacy.us.dlink.com/pages/product.aspx?id=2b09e95d90ff4cb38830ecc04c89cee5; https://nvd.nist.gov/vuln/detail/CVE-2021-40655
|
CWE-863
|
CVE-2014-100005
|
D-Link
|
DIR-600 Router
|
D-Link DIR-600 Router Cross-Site Request Forgery (CSRF) Vulnerability
|
2024-05-16
|
D-Link DIR-600 routers contain a cross-site request forgery (CSRF) vulnerability that allows an attacker to change router configurations by hijacking an existing administrator session.
|
This vulnerability affects legacy D-Link products. All associated hardware revisions have reached their end-of-life (EOL) or end-of-service (EOS) life cycle and should be retired and replaced per vendor instructions.
|
2024-06-06
|
Unknown
|
https://legacy.us.dlink.com/pages/product.aspx?id=4587b63118524aec911191cc81605283; https://nvd.nist.gov/vuln/detail/CVE-2014-100005
|
CWE-352
|
CVE-2024-30040
|
Microsoft
|
Windows
|
Microsoft Windows MSHTML Platform Security Feature Bypass Vulnerability
|
2024-05-14
|
Microsoft Windows MSHTML Platform contains an unspecified vulnerability that allows for a security feature bypass.
|
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
|
2024-06-04
|
Unknown
|
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30040; https://nvd.nist.gov/vuln/detail/CVE-2024-30040
|
CWE-20
|
CVE-2024-30051
|
Microsoft
|
DWM Core Library
|
Microsoft DWM Core Library Privilege Escalation Vulnerability
|
2024-05-14
|
Microsoft DWM Core Library contains a privilege escalation vulnerability that allows an attacker to gain SYSTEM privileges.
|
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
|
2024-06-04
|
Unknown
|
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30051; https://nvd.nist.gov/vuln/detail/CVE-2024-30051
|
CWE-122
|
CVE-2024-4671
|
Google
|
Chromium
|
Google Chromium Visuals Use-After-Free Vulnerability
|
2024-05-13
|
Google Chromium Visuals contains a use-after-free vulnerability that allows a remote attacker to exploit heap corruption via a crafted HTML page. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera.
|
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
|
2024-06-03
|
Unknown
|
https://chromereleases.googleblog.com/2024/05/stable-channel-update-for-desktop_9.html?m=1; https://nvd.nist.gov/vuln/detail/CVE-2024-4671
|
CWE-416
|
CVE-2023-7028
|
GitLab
|
GitLab CE/EE
|
GitLab Community and Enterprise Editions Improper Access Control Vulnerability
|
2024-05-01
|
GitLab Community and Enterprise Editions contain an improper access control vulnerability. This allows an attacker to trigger password reset emails to be sent to an unverified email address to ultimately facilitate an account takeover.
|
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
|
2024-05-22
|
Unknown
|
https://about.gitlab.com/releases/2024/01/11/critical-security-release-gitlab-16-7-2-released/ ; https://nvd.nist.gov/vuln/detail/CVE-2023-7028
|
CWE-284
|
CVE-2024-29988
|
Microsoft
|
SmartScreen Prompt
|
Microsoft SmartScreen Prompt Security Feature Bypass Vulnerability
|
2024-04-30
|
Microsoft SmartScreen Prompt contains a security feature bypass vulnerability that allows an attacker to bypass the Mark of the Web (MotW) feature. This vulnerability can be chained with CVE-2023-38831 and CVE-2024-21412 to execute a malicious file.
|
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
|
2024-05-21
|
Unknown
|
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29988; https://nvd.nist.gov/vuln/detail/CVE-2024-29988
|
CWE-693
|
End of preview. Expand
in Data Studio
No dataset card yet
- Downloads last month
- 15