Dataset Viewer
Auto-converted to Parquet Duplicate
cveID
stringlengths
13
16
vendorProject
stringclasses
187 values
product
stringlengths
2
179
vulnerabilityName
stringlengths
30
136
dateAdded
stringclasses
232 values
shortDescription
stringlengths
55
567
requiredAction
stringclasses
28 values
dueDate
stringlengths
10
10
knownRansomwareCampaignUse
stringclasses
2 values
notes
stringlengths
46
505
cwes
stringclasses
185 values
CVE-2024-37383
Roundcube
Webmail
RoundCube Webmail Cross-Site Scripting (XSS) Vulnerability
2024-10-24
RoundCube Webmail contains a cross-site scripting (XSS) vulnerability in the handling of SVG animate attributes that allows a remote attacker to run malicious JavaScript code.
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
2024-11-14
Unknown
https://github.com/roundcube/roundcubemail/releases/tag/1.5.7, https://github.com/roundcube/roundcubemail/releases/tag/1.6.7 ; https://nvd.nist.gov/vuln/detail/CVE-2024-37383
CWE-79
CVE-2024-20481
Cisco
Adaptive Security Appliance (ASA) and Firepower Threat Defense (FTD)
Cisco ASA and FTD Denial-of-Service Vulnerability
2024-10-24
Cisco Adaptive Security Appliance (ASA) and Firepower Threat Defense (FTD) contain a missing release of resource after effective lifetime vulnerability that could allow an unauthenticated, remote attacker to cause a denial-of-service (DoS) of the RAVPN service.
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
2024-11-14
Unknown
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-bf-dos-vDZhLqrW ; https://nvd.nist.gov/vuln/detail/CVE-2024-20481
CWE-772
CVE-2024-47575
Fortinet
FortiManager
Fortinet FortiManager Missing Authentication Vulnerability
2024-10-23
Fortinet FortiManager contains a missing authentication vulnerability in the fgfmd daemon that allows a remote, unauthenticated attacker to execute arbitrary code or commands via specially crafted requests.
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
2024-11-13
Unknown
https://fortiguard.fortinet.com/psirt/FG-IR-24-423 ; https://nvd.nist.gov/vuln/detail/CVE-2024-47575
CWE-306
CVE-2024-38094
Microsoft
SharePoint
Microsoft SharePoint Deserialization Vulnerability
2024-10-22
Microsoft SharePoint contains a deserialization vulnerability that allows for remote code execution.
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
2024-11-12
Unknown
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38094 ; https://nvd.nist.gov/vuln/detail/CVE-2024-38094
CWE-502
CVE-2024-9537
ScienceLogic
SL1
ScienceLogic SL1 Unspecified Vulnerability
2024-10-21
ScienceLogic SL1 (formerly EM7) is affected by an unspecified vulnerability involving an unspecified third-party component.
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
2024-11-11
Unknown
https://support.sciencelogic.com/s/article/15527 ; https://nvd.nist.gov/vuln/detail/CVE-2024-9537
null
CVE-2024-40711
Veeam
Backup & Replication
Veeam Backup and Replication Deserialization Vulnerability
2024-10-17
Veeam Backup and Replication contains a deserialization vulnerability allowing an unauthenticated user to perform remote code execution.
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
2024-11-07
Known
https://www.veeam.com/kb4649 ; https://nvd.nist.gov/vuln/detail/CVE-2024-40711
CWE-502
CVE-2024-28987
SolarWinds
Web Help Desk
SolarWinds Web Help Desk Hardcoded Credential Vulnerability
2024-10-15
SolarWinds Web Help Desk contains a hardcoded credential vulnerability that could allow a remote, unauthenticated user to access internal functionality and modify data.
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
2024-11-05
Unknown
https://www.solarwinds.com/trust-center/security-advisories/cve-2024-28987 ; https://nvd.nist.gov/vuln/detail/CVE-2024-28987
CWE-798
CVE-2024-9680
Mozilla
Firefox
Mozilla Firefox Use-After-Free Vulnerability
2024-10-15
Mozilla Firefox and Firefox ESR contain a use-after-free vulnerability in Animation timelines that allows for code execution in the content process.
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
2024-11-05
Unknown
https://www.mozilla.org/en-US/security/advisories/mfsa2024-51/ ; https://nvd.nist.gov/vuln/detail/CVE-2024-9680
CWE-416
CVE-2024-30088
Microsoft
Windows
Microsoft Windows Kernel TOCTOU Race Condition Vulnerability
2024-10-15
Microsoft Windows Kernel contains a time-of-check to time-of-use (TOCTOU) race condition vulnerability that could allow for privilege escalation.
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
2024-11-05
Unknown
https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2024-30088 ; https://nvd.nist.gov/vuln/detail/CVE-2024-30088
CWE-367
CVE-2024-9380
Ivanti
Cloud Services Appliance (CSA)
Ivanti Cloud Services Appliance (CSA) OS Command Injection Vulnerability
2024-10-09
Ivanti Cloud Services Appliance (CSA) contains an OS command injection vulnerability in the administrative console which can allow an authenticated attacker with application admin privileges to pass commands to the underlying OS.
As Ivanti CSA 4.6.x has reached End-of-Life status, users are urged to remove CSA 4.6.x from service or upgrade to the 5.0.x line, or later, of supported solution.
2024-10-30
Unknown
https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-CSA-Cloud-Services-Appliance-CVE-2024-9379-CVE-2024-9380-CVE-2024-9381 ; https://nvd.nist.gov/vuln/detail/CVE-2024-9380
CWE-77
CVE-2024-9379
Ivanti
Cloud Services Appliance (CSA)
Ivanti Cloud Services Appliance (CSA) SQL Injection Vulnerability
2024-10-09
Ivanti Cloud Services Appliance (CSA) contains a SQL injection vulnerability in the admin web console in versions prior to 5.0.2, which can allow a remote attacker authenticated as administrator to run arbitrary SQL statements.
As Ivanti CSA 4.6.x has reached End-of-Life status, users are urged to remove CSA 4.6.x from service or upgrade to the 5.0.x line, or later, of supported solution.
2024-10-30
Unknown
https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-CSA-Cloud-Services-Appliance-CVE-2024-9379-CVE-2024-9380-CVE-2024-9381 ; https://nvd.nist.gov/vuln/detail/CVE-2024-9379
CWE-89
CVE-2024-23113
Fortinet
Multiple Products
Fortinet Multiple Products Format String Vulnerability
2024-10-09
Fortinet FortiOS, FortiPAM, FortiProxy, and FortiWeb contain a format string vulnerability that allows a remote, unauthenticated attacker to execute arbitrary code or commands via specially crafted requests.
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
2024-10-30
Unknown
https://www.fortiguard.com/psirt/FG-IR-24-029 ; https://nvd.nist.gov/vuln/detail/CVE-2024-23113
CWE-134
CVE-2024-43573
Microsoft
Windows
Microsoft Windows MSHTML Platform Spoofing Vulnerability
2024-10-08
Microsoft Windows MSHTML Platform contains an unspecified spoofing vulnerability which can lead to a loss of confidentiality.
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
2024-10-29
Unknown
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43573 ; https://nvd.nist.gov/vuln/detail/CVE-2024-43573
null
CVE-2024-43572
Microsoft
Windows
Microsoft Windows Management Console Remote Code Execution Vulnerability
2024-10-08
Microsoft Windows Management Console contains unspecified vulnerability that allows for remote code execution.
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
2024-10-29
Unknown
https://msrc.microsoft.com/update-guide/advisory/CVE-2024-43572 ; https://nvd.nist.gov/vuln/detail/CVE-2024-43572
null
CVE-2024-43047
Qualcomm
Multiple Chipsets
Qualcomm Multiple Chipsets Use-After-Free Vulnerability
2024-10-08
Multiple Qualcomm chipsets contain a use-after-free vulnerability due to memory corruption in DSP Services while maintaining memory maps of HLOS memory.
Apply remediations or mitigations per vendor instructions or discontinue use of the product if remediation or mitigations are unavailable.
2024-10-29
Unknown
https://git.codelinaro.org/clo/la/platform/vendor/qcom/opensource/dsp-kernel/-/commit/0e27b6c7d2bd8d0453e4465ac2ca49a8f8c440e2 ; https://nvd.nist.gov/vuln/detail/CVE-2024-43047
CWE-416
CVE-2024-45519
Synacor
Zimbra Collaboration
Synacor Zimbra Collaboration Command Execution Vulnerability
2024-10-03
Synacor Zimbra Collaboration contains an unspecified vulnerability in the postjournal service that may allow an unauthenticated user to execute commands.
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
2024-10-24
Unknown
https://wiki.zimbra.com/wiki/Zimbra_Security_Advisories ; https://nvd.nist.gov/vuln/detail/CVE-2024-45519
null
CVE-2024-29824
Ivanti
Endpoint Manager (EPM)
Ivanti Endpoint Manager (EPM) SQL Injection Vulnerability
2024-10-02
Ivanti Endpoint Manager (EPM) contains a SQL injection vulnerability in Core server that allows an unauthenticated attacker within the same network to execute arbitrary code.
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
2024-10-23
Unknown
https://forums.ivanti.com/s/article/Security-Advisory-May-2024 ; https://nvd.nist.gov/vuln/detail/CVE-2024-29824
CWE-89
CVE-2019-0344
SAP
Commerce Cloud
SAP Commerce Cloud Deserialization of Untrusted Data Vulnerability
2024-09-30
SAP Commerce Cloud (formerly known as Hybris) contains a deserialization of untrusted data vulnerability within the mediaconversion and virtualjdbc extension that allows for code injection.
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
2024-10-21
Unknown
https://web.archive.org/web/20191214053020/https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=523998017 ; https://nvd.nist.gov/vuln/detail/CVE-2019-0344
CWE-502
CVE-2021-4043
Motion Spell
GPAC
Motion Spell GPAC Null Pointer Dereference Vulnerability
2024-09-30
Motion Spell GPAC contains a null pointer dereference vulnerability that could allow a local attacker to cause a denial-of-service (DoS) condition.
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
2024-10-21
Unknown
This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. For more information, please see: https://github.com/gpac/gpac/commit/64a2e1b799352ac7d7aad1989bc06e7b0f2b01db ; https://nvd.nist.gov/vuln/detail/CVE-2021-4043
CWE-476
CVE-2020-15415
DrayTek
Multiple Vigor Routers
DrayTek Multiple Vigor Routers OS Command Injection Vulnerability
2024-09-30
DrayTek Vigor3900, Vigor2960, and Vigor300B devices contain an OS command injection vulnerability in cgi-bin/mainfunction.cgi/cvmcfgupload that allows for remote code execution via shell metacharacters in a filename when the text/x-python-script content type is used.
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
2024-10-21
Unknown
https://www.draytek.com/about/security-advisory/vigor3900-/-vigor2960-/-vigor300b-remote-code-injection/execution-vulnerability-(cve-2020-14472) ; https://nvd.nist.gov/vuln/detail/CVE-2020-15415
CWE-78
CVE-2023-25280
D-Link
DIR-820 Router
D-Link DIR-820 Router OS Command Injection Vulnerability
2024-09-30
D-Link DIR-820 routers contain an OS command injection vulnerability that allows a remote, unauthenticated attacker to escalate privileges to root via a crafted payload with the ping_addr parameter to ping.ccp.
The impacted product is end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue utilization of the product.
2024-10-21
Unknown
https://supportannouncement.us.dlink.com/security/publication.aspx?name=SAP10358 ; https://nvd.nist.gov/vuln/detail/CVE-2023-25280
CWE-78
CVE-2024-7593
Ivanti
Virtual Traffic Manager
Ivanti Virtual Traffic Manager Authentication Bypass Vulnerability
2024-09-24
Ivanti Virtual Traffic Manager contains an authentication bypass vulnerability that allows a remote, unauthenticated attacker to create a chosen administrator account.
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
2024-10-15
Unknown
https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Virtual-Traffic-Manager-vTM-CVE-2024-7593 ; https://nvd.nist.gov/vuln/detail/CVE-2024-7593
CWE-287, CWE-303
CVE-2024-8963
Ivanti
Cloud Services Appliance (CSA)
Ivanti Cloud Services Appliance (CSA) Path Traversal Vulnerability
2024-09-19
Ivanti Cloud Services Appliance (CSA) contains a path traversal vulnerability that could allow a remote, unauthenticated attacker to access restricted functionality. If CVE-2024-8963 is used in conjunction with CVE-2024-8190, an attacker could bypass admin authentication and execute arbitrary commands on the appliance.
As Ivanti CSA has reached End-of-Life status, users are urged to remove CSA 4.6.x from service or upgrade to the 5.0.x line of supported solutions, as future vulnerabilities on the 4.6.x version of CSA are unlikely to receive security updates.
2024-10-10
Unknown
https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-CSA-4-6-Cloud-Services-Appliance-CVE-2024-8963 ; https://nvd.nist.gov/vuln/detail/CVE-2024-8963
CWE-22
CVE-2020-14644
Oracle
WebLogic Server
Oracle WebLogic Server Remote Code Execution Vulnerability
2024-09-18
Oracle WebLogic Server, a product within the Fusion Middleware suite, contains a deserialization vulnerability. Unauthenticated attackers with network access via T3 or IIOP can exploit this vulnerability to achieve remote code execution.
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
2024-10-09
Unknown
https://www.oracle.com/security-alerts/cpujul2020.html ; https://nvd.nist.gov/vuln/detail/CVE-2020-14644
null
CVE-2022-21445
Oracle
ADF Faces
Oracle ADF Faces Deserialization of Untrusted Data Vulnerability
2024-09-18
Oracle ADF Faces library, included with Oracle JDeveloper Distribution, contains a deserialization of untrusted data vulnerability leading to unauthenticated remote code execution.
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
2024-10-09
Unknown
https://www.oracle.com/security-alerts/cpuapr2022.html ; https://nvd.nist.gov/vuln/detail/CVE-2022-21445
null
CVE-2020-0618
Microsoft
SQL Server
Microsoft SQL Server Reporting Services Remote Code Execution Vulnerability
2024-09-18
Microsoft SQL Server Reporting Services contains a deserialization vulnerability when handling page requests incorrectly. An authenticated attacker can exploit this vulnerability to execute code in the context of the Report Server service account.
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
2024-10-09
Unknown
https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2020-0618 ; https://nvd.nist.gov/vuln/detail/CVE-2020-0618
null
CVE-2024-27348
Apache
HugeGraph-Server
Apache HugeGraph-Server Improper Access Control Vulnerability
2024-09-18
Apache HugeGraph-Server contains an improper access control vulnerability that could allow a remote attacker to execute arbitrary code.
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
2024-10-09
Unknown
This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. For more information, please see: https://lists.apache.org/thread/nx6g6htyhpgtzsocybm242781o8w5kq9 ; https://nvd.nist.gov/vuln/detail/CVE-2024-27348
CWE-284
CVE-2014-0502
Adobe
Flash Player
Adobe Flash Player Double Free Vulnerablity
2024-09-17
Adobe Flash Player contains a double free vulnerability that allows a remote attacker to execute arbitrary code.
The impacted product is end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue utilization of the product.
2024-10-08
Unknown
https://www.adobe.com/products/flashplayer/end-of-life-alternative.html#eol-alternative-faq ; https://nvd.nist.gov/vuln/detail/CVE-2014-0502
CWE-399
CVE-2013-0648
Adobe
Flash Player
Adobe Flash Player Code Execution Vulnerability
2024-09-17
Adobe Flash Player contains an unspecified vulnerability in the ExternalInterface ActionScript functionality that allows a remote attacker to execute arbitrary code via crafted SWF content.
The impacted product is end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue utilization of the product.
2024-10-08
Unknown
https://www.adobe.com/products/flashplayer/end-of-life-alternative.html#eol-alternative-faq ; https://nvd.nist.gov/vuln/detail/CVE-2013-0648
null
CVE-2013-0643
Adobe
Flash Player
Adobe Flash Player Incorrect Default Permissions Vulnerability
2024-09-17
Adobe Flash Player contains an incorrect default permissions vulnerability in the Firefox sandbox that allows a remote attacker to execute arbitrary code via crafted SWF content.
The impacted product is end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue utilization of the product.
2024-10-08
Unknown
https://www.adobe.com/products/flashplayer/end-of-life-alternative.html#eol-alternative-faq ; https://nvd.nist.gov/vuln/detail/CVE-2013-0643
CWE-264
CVE-2014-0497
Adobe
Flash Player
Adobe Flash Player Integer Underflow Vulnerablity
2024-09-17
Adobe Flash Player contains an integer underflow vulnerability that allows a remote attacker to execute arbitrary code.
The impacted product is end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue utilization of the product.
2024-10-08
Unknown
https://www.adobe.com/products/flashplayer/end-of-life-alternative.html#eol-alternative-faq ; https://nvd.nist.gov/vuln/detail/CVE-2014-0497
CWE-191
CVE-2024-6670
Progress
WhatsUp Gold
Progress WhatsUp Gold SQL Injection Vulnerability
2024-09-16
Progress WhatsUp Gold contains a SQL injection vulnerability that allows an unauthenticated attacker to retrieve the user's encrypted password if the application is configured with only a single user.
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
2024-10-07
Known
https://community.progress.com/s/article/WhatsUp-Gold-Security-Bulletin-August-2024 ; https://nvd.nist.gov/vuln/detail/CVE-2024-6670
CWE-89
CVE-2024-43461
Microsoft
Windows
Microsoft Windows MSHTML Platform Spoofing Vulnerability
2024-09-16
Microsoft Windows MSHTML Platform contains a user interface (UI) misrepresentation of critical information vulnerability that allows an attacker to spoof a web page. This vulnerability was exploited in conjunction with CVE-2024-38112.
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
2024-10-07
Unknown
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43461 ; https://nvd.nist.gov/vuln/detail/CVE-2024-43461
CWE-451
CVE-2024-8190
Ivanti
Cloud Services Appliance
Ivanti Cloud Services Appliance OS Command Injection Vulnerability
2024-09-13
Ivanti Cloud Services Appliance (CSA) contains an OS command injection vulnerability in the administrative console which can allow an authenticated attacker with application admin privileges to pass commands to the underlying OS.
As Ivanti CSA has reached End-of-Life status, users are urged to remove CSA 4.6.x from service or upgrade to the 5.0.x line of supported solutions, as future vulnerabilities on the 4.6.x version of CSA are unlikely to receive future security updates.
2024-10-04
Unknown
https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Cloud-Service-Appliance-CSA-CVE-2024-8190; https://nvd.nist.gov/vuln/detail/CVE-2024-8190
CWE-78
CVE-2024-38217
Microsoft
Windows
Microsoft Windows Mark of the Web (MOTW) Protection Mechanism Failure Vulnerability
2024-09-10
Microsoft Windows Mark of the Web (MOTW) contains a protection mechanism failure vulnerability that allows an attacker to bypass MOTW-based defenses. This can result in a limited loss of integrity and availability of security features such as Protected View in Microsoft Office, which rely on MOTW tagging.
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
2024-10-01
Unknown
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38217; https://nvd.nist.gov/vuln/detail/CVE-2024-38217
CWE-693
CVE-2024-38014
Microsoft
Windows
Microsoft Windows Installer Improper Privilege Management Vulnerability
2024-09-10
Microsoft Windows Installer contains an improper privilege management vulnerability that could allow an attacker to gain SYSTEM privileges.
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
2024-10-01
Unknown
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38014; https://nvd.nist.gov/vuln/detail/CVE-2024-38014
CWE-269
CVE-2024-38226
Microsoft
Publisher
Microsoft Publisher Protection Mechanism Failure Vulnerability
2024-09-10
Microsoft Publisher contains a protection mechanism failure vulnerability that allows attacker to bypass Office macro policies used to block untrusted or malicious files.
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
2024-10-01
Unknown
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38226; https://nvd.nist.gov/vuln/detail/CVE-2024-38226
CWE-693
CVE-2024-40766
SonicWall
SonicOS
SonicWall SonicOS Improper Access Control Vulnerability
2024-09-09
SonicWall SonicOS contains an improper access control vulnerability that could lead to unauthorized resource access and, under certain conditions, may cause the firewall to crash.
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
2024-09-30
Unknown
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2024-0015; https://nvd.nist.gov/vuln/detail/CVE-2024-40766
CWE-284
CVE-2017-1000253
Linux
Kernel
Linux Kernel PIE Stack Buffer Corruption Vulnerability
2024-09-09
Linux kernel contains a position-independent executable (PIE) stack buffer corruption vulnerability in load_elf_ binary() that allows a local attacker to escalate privileges.
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
2024-09-30
Known
This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. For more information, please see: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a87938b2e246b81b4fb713edb371a9fa3c5c3c86; https://nvd.nist.gov/vuln/detail/CVE-2017-1000253
CWE-119
CVE-2016-3714
ImageMagick
ImageMagick
ImageMagick Improper Input Validation Vulnerability
2024-09-09
ImageMagick contains an improper input validation vulnerability that affects the EPHEMERAL, HTTPS, MVG, MSL, TEXT, SHOW, WIN, and PLT coders. This allows a remote attacker to execute arbitrary code via shell metacharacters in a crafted image.
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
2024-09-30
Unknown
This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. For more information, please see: https://www.imagemagick.org/discourse-server/viewtopic.php?f=4&t=29588#p132726, https://imagemagick.org/archive/releases/; https://nvd.nist.gov/vuln/detail/CVE-2016-3714
CWE-20
CVE-2024-7262
Kingsoft
WPS Office
Kingsoft WPS Office Path Traversal Vulnerability
2024-09-03
Kingsoft WPS Office contains a path traversal vulnerability in promecefpluginhost.exe on Windows that allows an attacker to load an arbitrary Windows library.
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
2024-09-24
Unknown
While CISA cannot confirm the effectiveness of patches at this time, it is recommended that mitigations be applied per vendor instructions if available. If these instructions cannot be located or if mitigations are unavailable, discontinue the use of the product.; https://nvd.nist.gov/vuln/detail/CVE-2024-7262
CWE-22
CVE-2021-20124
DrayTek
VigorConnect
Draytek VigorConnect Path Traversal Vulnerability
2024-09-03
Draytek VigorConnect contains a path traversal vulnerability in the file download functionality of the WebServlet endpoint. An unauthenticated attacker could leverage this vulnerability to download arbitrary files from the underlying operating system with root privileges.
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
2024-09-24
Unknown
https://www.draytek.com/about/security-advisory/vigorconnect-software-security-vulnerability-(cve-2021-20123-cve-2021-20129); https://nvd.nist.gov/vuln/detail/CVE-2021-20124
CWE-22
CVE-2021-20123
DrayTek
VigorConnect
Draytek VigorConnect Path Traversal Vulnerability
2024-09-03
Draytek VigorConnect contains a path traversal vulnerability in the DownloadFileServlet endpoint. An unauthenticated attacker could leverage this vulnerability to download arbitrary files from the underlying operating system with root privileges.
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
2024-09-24
Unknown
https://www.draytek.com/about/security-advisory/vigorconnect-software-security-vulnerability-(cve-2021-20123-cve-2021-20129); https://nvd.nist.gov/vuln/detail/CVE-2021-20123
CWE-22
CVE-2024-7965
Google
Chromium V8
Google Chromium V8 Inappropriate Implementation Vulnerability
2024-08-28
Google Chromium V8 contains an inappropriate implementation vulnerability that allows a remote attacker to potentially exploit heap corruption via a crafted HTML page. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera.
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
2024-09-18
Unknown
https://chromereleases.googleblog.com/2024/08/stable-channel-update-for-desktop_21.html; https://nvd.nist.gov/vuln/detail/CVE-2024-7965
CWE-358
CVE-2024-38856
Apache
OFBiz
Apache OFBiz Incorrect Authorization Vulnerability
2024-08-27
Apache OFBiz contains an incorrect authorization vulnerability that could allow remote code execution via a Groovy payload in the context of the OFBiz user process by an unauthenticated attacker.
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
2024-09-17
Unknown
This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. Please check with specific vendors for information on patching status. For more information, please see: https://lists.apache.org/thread/olxxjk6b13sl3wh9cmp0k2dscvp24l7w; https://nvd.nist.gov/vuln/detail/CVE-2024-38856
CWE-863
CVE-2024-7971
Google
Chromium V8
Google Chromium V8 Type Confusion Vulnerability
2024-08-26
Google Chromium V8 contains a type confusion vulnerability that allows a remote attacker to exploit heap corruption via a crafted HTML page. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera.
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
2024-09-16
Unknown
https://chromereleases.googleblog.com/2024/08/stable-channel-update-for-desktop_21.html; https://nvd.nist.gov/vuln/detail/CVE-2024-7971
CWE-843
CVE-2024-39717
Versa
Director
Versa Director Dangerous File Type Upload Vulnerability
2024-08-23
The Versa Director GUI contains an unrestricted upload of file with dangerous type vulnerability that allows administrators with Provider-Data-Center-Admin or Provider-Data-Center-System-Admin privileges to customize the user interface. The “Change Favicon” (Favorite Icon) enables the upload of a .png file, which can be exploited to upload a malicious file with a .png extension disguised as an image.
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
2024-09-13
Unknown
https://versa-networks.com/blog/versa-security-bulletin-update-on-cve-2024-39717-versa-director-dangerous-file-type-upload-vulnerability/; https://nvd.nist.gov/vuln/detail/CVE-2024-39717
CWE-434
CVE-2021-31196
Microsoft
Exchange Server
Microsoft Exchange Server Information Disclosure Vulnerability
2024-08-21
Microsoft Exchange Server contains an information disclosure vulnerability that allows for remote code execution.
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
2024-09-11
Unknown
https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2021-31196; https://nvd.nist.gov/vuln/detail/CVE-2021-31196
null
CVE-2022-0185
Linux
Kernel
Linux Kernel Heap-Based Buffer Overflow Vulnerability
2024-08-21
Linux kernel contains a heap-based buffer overflow vulnerability in the legacy_parse_param function in the Filesystem Context functionality. This allows an attacker to open a filesystem that does not support the Filesystem Context API and ultimately escalate privileges.
Apply updates per vendor instructions or discontinue use of the product if updates are unavailable.
2024-09-11
Unknown
This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. For more information, please see: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=722d94847de2; https://nvd.nist.gov/vuln/detail/CVE-2022-0185
CWE-190
CVE-2021-33045
Dahua
IP Camera Firmware
Dahua IP Camera Authentication Bypass Vulnerability
2024-08-21
Dahua IP cameras and related products contain an authentication bypass vulnerability when the loopback device is specified by the client during authentication.
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
2024-09-11
Unknown
https://www.dahuasecurity.com/aboutUs/trustedCenter/details/582; https://nvd.nist.gov/vuln/detail/CVE-2021-33045
CWE-287
CVE-2021-33044
Dahua
IP Camera Firmware
Dahua IP Camera Authentication Bypass Vulnerability
2024-08-21
Dahua IP cameras and related products contain an authentication bypass vulnerability when the NetKeyboard type argument is specified by the client during authentication.
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
2024-09-11
Unknown
https://www.dahuasecurity.com/aboutUs/trustedCenter/details/582; https://nvd.nist.gov/vuln/detail/CVE-2021-33044
CWE-287
CVE-2024-23897
Jenkins
Jenkins Command Line Interface (CLI)
Jenkins Command Line Interface (CLI) Path Traversal Vulnerability
2024-08-19
Jenkins Command Line Interface (CLI) contains a path traversal vulnerability that allows attackers limited read access to certain files, which can lead to code execution.
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
2024-09-09
Known
https://www.jenkins.io/security/advisory/2024-01-24/#SECURITY-3314; https://nvd.nist.gov/vuln/detail/CVE-2024-23897
CWE-27
CVE-2024-28986
SolarWinds
Web Help Desk
SolarWinds Web Help Desk Deserialization of Untrusted Data Vulnerability
2024-08-15
SolarWinds Web Help Desk contains a deserialization of untrusted data vulnerability that could allow for remote code execution.
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
2024-09-05
Unknown
https://www.solarwinds.com/trust-center/security-advisories/cve-2024-28986; https://nvd.nist.gov/vuln/detail/CVE-2024-28986
CWE-502
CVE-2024-38107
Microsoft
Windows
Microsoft Windows Power Dependency Coordinator Privilege Escalation Vulnerability
2024-08-13
Microsoft Windows Power Dependency Coordinator contains an unspecified vulnerability that allows for privilege escalation, enabling a local attacker to obtain SYSTEM privileges.
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
2024-09-03
Unknown
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38107; https://nvd.nist.gov/vuln/detail/CVE-2024-38107
CWE-416
CVE-2024-38106
Microsoft
Windows
Microsoft Windows Kernel Privilege Escalation Vulnerability
2024-08-13
Microsoft Windows Kernel contains an unspecified vulnerability that allows for privilege escalation, enabling a local attacker to gain SYSTEM privileges. Successful exploitation of this vulnerability requires an attacker to win a race condition.
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
2024-09-03
Unknown
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38106; https://nvd.nist.gov/vuln/detail/CVE-2024-38106
CWE-591
CVE-2024-38193
Microsoft
Windows
Microsoft Windows Ancillary Function Driver for WinSock Privilege Escalation Vulnerability
2024-08-13
Microsoft Windows Ancillary Function Driver for WinSock contains an unspecified vulnerability that allows for privilege escalation, enabling a local attacker to gain SYSTEM privileges.
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
2024-09-03
Unknown
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38193; https://nvd.nist.gov/vuln/detail/CVE-2024-38193
CWE-416
CVE-2024-38213
Microsoft
Windows
Microsoft Windows SmartScreen Security Feature Bypass Vulnerability
2024-08-13
Microsoft Windows SmartScreen contains a security feature bypass vulnerability that allows an attacker to bypass the SmartScreen user experience via a malicious file.
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
2024-09-03
Unknown
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38213; https://nvd.nist.gov/vuln/detail/CVE-2024-38213
CWE-693
CVE-2024-38178
Microsoft
Windows
Microsoft Windows Scripting Engine Memory Corruption Vulnerability
2024-08-13
Microsoft Windows Scripting Engine contains a memory corruption vulnerability that allows unauthenticated attacker to initiate remote code execution via a specially crafted URL.
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
2024-09-03
Unknown
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38178; https://nvd.nist.gov/vuln/detail/CVE-2024-38178
CWE-843
CVE-2024-38189
Microsoft
Project
Microsoft Project Remote Code Execution Vulnerability
2024-08-13
Microsoft Project contains an unspecified vulnerability that allows for remote code execution via a malicious file.
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
2024-09-03
Unknown
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38189; https://nvd.nist.gov/vuln/detail/CVE-2024-38189
CWE-20
CVE-2024-32113
Apache
OFBiz
Apache OFBiz Path Traversal Vulnerability
2024-08-07
Apache OFBiz contains a path traversal vulnerability that could allow for remote code execution.
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
2024-08-28
Unknown
This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. Please check with specific vendors for information on patching status. For more information, please see: https://lists.apache.org/thread/w6s60okgkxp2th1sr8vx0ndmgk68fqrd; https://nvd.nist.gov/vuln/detail/CVE-2024-32113
CWE-22
CVE-2024-36971
Android
Kernel
Android Kernel Remote Code Execution Vulnerability
2024-08-07
Android contains an unspecified vulnerability in the kernel that allows for remote code execution. This vulnerability resides in Linux Kernel and could impact other products, including but not limited to Android OS.
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
2024-08-28
Unknown
This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. Please check with specific vendors for information on patching status. For more information, please see: https://source.android.com/docs/security/bulletin/2024-08-01, https://lore.kernel.org/linux-cve-announce/[email protected]/T/#u ; https://nvd.nist.gov/vuln/detail/CVE-2024-36971
CWE-416
CVE-2018-0824
Microsoft
Windows
Microsoft COM for Windows Deserialization of Untrusted Data Vulnerability
2024-08-05
Microsoft COM for Windows contains a deserialization of untrusted data vulnerability that allows for privilege escalation and remote code execution via a specially crafted file or script.
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
2024-08-26
Unknown
https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2018-0824; https://nvd.nist.gov/vuln/detail/CVE-2018-0824
CWE-502
CVE-2024-37085
VMware
ESXi
VMware ESXi Authentication Bypass Vulnerability
2024-07-30
VMware ESXi contains an authentication bypass vulnerability. A malicious actor with sufficient Active Directory (AD) permissions can gain full access to an ESXi host that was previously configured to use AD for user management by re-creating the configured AD group ('ESXi Admins' by default) after it was deleted from AD.
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
2024-08-20
Known
https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/24505; https://nvd.nist.gov/vuln/detail/CVE-2024-37085
CWE-305
CVE-2023-45249
Acronis
Cyber Infrastructure (ACI)
Acronis Cyber Infrastructure (ACI) Insecure Default Password Vulnerability
2024-07-29
Acronis Cyber Infrastructure (ACI) allows an unauthenticated user to execute commands remotely due to the use of default passwords.
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
2024-08-19
Unknown
https://security-advisory.acronis.com/advisories/SEC-6452; https://nvd.nist.gov/vuln/detail/CVE-2023-45249
CWE-1393
CVE-2024-5217
ServiceNow
Utah, Vancouver, and Washington DC Now
ServiceNow Incomplete List of Disallowed Inputs Vulnerability
2024-07-29
ServiceNow Washington DC, Vancouver, and earlier Now Platform releases contain an incomplete list of disallowed inputs vulnerability in the GlideExpression script. An unauthenticated user could exploit this vulnerability to execute code remotely.
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
2024-08-19
Unknown
https://support.servicenow.com/kb?id=kb_article_view&sysparm_article=KB1648313; https://nvd.nist.gov/vuln/detail/CVE-2024-5217
CWE-184
CVE-2024-4879
ServiceNow
Utah, Vancouver, and Washington DC Now
ServiceNow Improper Input Validation Vulnerability
2024-07-29
ServiceNow Utah, Vancouver, and Washington DC Now releases contain a jelly template injection vulnerability in UI macros. An unauthenticated user could exploit this vulnerability to execute code remotely.
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
2024-08-19
Unknown
https://support.servicenow.com/kb?id=kb_article_view&sysparm_article=KB1645154; https://nvd.nist.gov/vuln/detail/CVE-2024-4879
CWE-1287
CVE-2024-39891
Twilio
Authy
Twilio Authy Information Disclosure Vulnerability
2024-07-23
Twilio Authy contains an information disclosure vulnerability in its API that allows an unauthenticated endpoint to accept a request containing a phone number and respond with information about whether the phone number was registered with Authy.
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
2024-08-13
Unknown
https://www.twilio.com/en-us/changelog/Security_Alert_Authy_App_Android_iOS; https://nvd.nist.gov/vuln/detail/CVE-2024-39891
CWE-203
CVE-2012-4792
Microsoft
Internet Explorer
Microsoft Internet Explorer Use-After-Free Vulnerability
2024-07-23
Microsoft Internet Explorer contains a use-after-free vulnerability that allows a remote attacker to execute arbitrary code via a crafted web site that triggers access to an object that (1) was not properly allocated or (2) is deleted, as demonstrated by a CDwnBindInfo object.
The impacted product is end-of-life and should be disconnected if still in use.
2024-08-13
Unknown
https://learn.microsoft.com/en-us/lifecycle/products/internet-explorer-11; https://nvd.nist.gov/vuln/detail/CVE-2012-4792
CWE-416
CVE-2022-22948
VMware
vCenter Server
VMware vCenter Server Incorrect Default File Permissions Vulnerability
2024-07-17
VMware vCenter Server contains an incorrect default file permissions vulnerability that allows a remote, privileged attacker to gain access to sensitive information.
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
2024-08-07
Unknown
https://www.vmware.com/security/advisories/VMSA-2022-0009.html; https://nvd.nist.gov/vuln/detail/CVE-2022-22948
CWE-276
CVE-2024-28995
SolarWinds
Serv-U
SolarWinds Serv-U Path Traversal Vulnerability
2024-07-17
SolarWinds Serv-U contains a path traversal vulnerability that allows an attacker access to read sensitive files on the host machine.
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
2024-08-07
Unknown
https://www.solarwinds.com/trust-center/security-advisories/cve-2024-28995; https://nvd.nist.gov/vuln/detail/CVE-2024-28995
CWE-22
CVE-2024-34102
Adobe
Commerce and Magento Open Source
Adobe Commerce and Magento Open Source Improper Restriction of XML External Entity Reference (XXE) Vulnerability
2024-07-17
Adobe Commerce and Magento Open Source contain an improper restriction of XML external entity reference (XXE) vulnerability that allows for remote code execution.
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
2024-08-07
Unknown
https://helpx.adobe.com/security/products/magento/apsb24-40.html; https://nvd.nist.gov/vuln/detail/CVE-2024-34102
CWE-611
CVE-2024-36401
OSGeo
GeoServer
OSGeo GeoServer GeoTools Eval Injection Vulnerability
2024-07-15
OSGeo GeoServer GeoTools contains an improper neutralization of directives in dynamically evaluated code vulnerability due to unsafely evaluating property names as XPath expressions. This allows unauthenticated attackers to conduct remote code execution via specially crafted input.
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
2024-08-05
Unknown
This vulnerability affects an open-source component, third-party library, or a protocol used by different products. For more information, please see: https://github.com/geoserver/geoserver/security/advisories/GHSA-6jj6-gm7p-fcvv, https://github.com/geotools/geotools/pull/4797 ; https://nvd.nist.gov/vuln/detail/CVE-2024-36401
CWE-95
CVE-2024-23692
Rejetto
HTTP File Server
Rejetto HTTP File Server Improper Neutralization of Special Elements Used in a Template Engine Vulnerability
2024-07-09
Rejetto HTTP File Server contains an improper neutralization of special elements used in a template engine vulnerability. This allows a remote, unauthenticated attacker to execute commands on the affected system by sending a specially crafted HTTP request.
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
2024-07-30
Unknown
The patched Rejetto HTTP File Server (HFS) is version 3: https://github.com/rejetto/hfs?tab=readme-ov-file#installation, https://www.rejetto.com/hfs/ ; https://nvd.nist.gov/vuln/detail/CVE-2024-23692
CWE-1336
CVE-2024-38080
Microsoft
Windows
Microsoft Windows Hyper-V Privilege Escalation Vulnerability
2024-07-09
Microsoft Windows Hyper-V contains a privilege escalation vulnerability that allows a local attacker with user permissions to gain SYSTEM privileges.
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
2024-07-30
Unknown
https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2024-38080; https://nvd.nist.gov/vuln/detail/CVE-2024-38080
CWE-190
CVE-2024-38112
Microsoft
Windows
Microsoft Windows MSHTML Platform Spoofing Vulnerability
2024-07-09
Microsoft Windows MSHTML Platform contains a spoofing vulnerability that has a high impact to confidentiality, integrity, and availability.
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
2024-07-30
Unknown
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38112; https://nvd.nist.gov/vuln/detail/CVE-2024-38112
CWE-451
CVE-2024-20399
Cisco
NX-OS
Cisco NX-OS Command Injection Vulnerability
2024-07-02
Cisco NX-OS contains a command injection vulnerability in the command line interface (CLI) that could allow an authenticated, local attacker to execute commands as root on the underlying operating system of an affected device.
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
2024-07-23
Unknown
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-cmd-injection-xD9OhyOP; https://nvd.nist.gov/vuln/detail/CVE-2024-20399
CWE-78
CVE-2020-13965
Roundcube
Webmail
Roundcube Webmail Cross-Site Scripting (XSS) Vulnerability
2024-06-26
Roundcube Webmail contains a cross-site scripting (XSS) vulnerability that allows a remote attacker to manipulate data via a malicious XML attachment.
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
2024-07-17
Unknown
https://roundcube.net/news/2020/06/02/security-updates-1.4.5-and-1.3.12; https://nvd.nist.gov/vuln/detail/CVE-2020-13965
CWE-80
CVE-2022-2586
Linux
Kernel
Linux Kernel Use-After-Free Vulnerability
2024-06-26
Linux Kernel contains a use-after-free vulnerability in the nft_object, allowing local attackers to escalate privileges.
Apply updates per vendor instructions or discontinue use of the product if updates are unavailable.
2024-07-17
Unknown
This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. For more information, please see: https://seclists.org/oss-sec/2022/q3/131; https://nvd.nist.gov/vuln/detail/CVE-2022-2586
CWE-416
CVE-2022-24816
OSGeo
JAI-EXT
OSGeo GeoServer JAI-EXT Code Injection Vulnerability
2024-06-26
OSGeo GeoServer JAI-EXT contains a code injection vulnerability that, when programs use jt-jiffle and allow Jiffle script to be provided via network request, could allow remote code execution.
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
2024-07-17
Unknown
This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. The patched JAI-EXT is version 1.1.22: https://github.com/geosolutions-it/jai-ext/releases/tag/1.1.22, https://github.com/geosolutions-it/jai-ext/security/advisories/GHSA-v92f-jx6p-73rx; https://nvd.nist.gov/vuln/detail/CVE-2022-24816
CWE-94
CVE-2024-4358
Progress
Telerik Report Server
Progress Telerik Report Server Authentication Bypass by Spoofing Vulnerability
2024-06-13
Progress Telerik Report Server contains an authorization bypass by spoofing vulnerability that allows an attacker to obtain unauthorized access.
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
2024-07-04
Unknown
https://docs.telerik.com/report-server/knowledge-base/registration-auth-bypass-cve-2024-4358; https://nvd.nist.gov/vuln/detail/CVE-2024-4358
CWE-290
CVE-2024-26169
Microsoft
Windows
Microsoft Windows Error Reporting Service Improper Privilege Management Vulnerability
2024-06-13
Microsoft Windows Error Reporting Service contains an improper privilege management vulnerability that allows a local attacker with user permissions to gain SYSTEM privileges.
Apply updates per vendor instructions or discontinue use of the product if updates are unavailable.
2024-07-04
Known
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26169; https://nvd.nist.gov/vuln/detail/CVE-2024-26169
CWE-269
CVE-2024-32896
Android
Pixel
Android Pixel Privilege Escalation Vulnerability
2024-06-13
Android Pixel contains an unspecified vulnerability in the firmware that allows for privilege escalation.
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
2024-07-04
Unknown
https://source.android.com/docs/security/bulletin/pixel/2024-06-01; https://nvd.nist.gov/vuln/detail/CVE-2024-32896
CWE-783
CVE-2024-4577
PHP Group
PHP
PHP-CGI OS Command Injection Vulnerability
2024-06-12
PHP, specifically Windows-based PHP used in CGI mode, contains an OS command injection vulnerability that allows for arbitrary code execution. This vulnerability is a patch bypass for CVE-2012-1823.
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
2024-07-03
Known
This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. Please check with specific vendors for information on patching status. For more information, please see: https://www.php.net/ChangeLog-8.php#; https://nvd.nist.gov/vuln/detail/CVE-2024-4577
CWE-78
CVE-2024-4610
Arm
Mali GPU Kernel Driver
Arm Mali GPU Kernel Driver Use-After-Free Vulnerability
2024-06-12
Arm Bifrost and Valhall GPU kernel drivers contain a use-after-free vulnerability that allows a local, non-privileged user to make improper GPU memory processing operations to gain access to already freed memory.
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
2024-07-03
Unknown
https://developer.arm.com/Arm%20Security%20Center/Mali%20GPU%20Driver%20Vulnerabilities; https://nvd.nist.gov/vuln/detail/CVE-2024-4610
CWE-416
CVE-2017-3506
Oracle
WebLogic Server
Oracle WebLogic Server OS Command Injection Vulnerability
2024-06-03
Oracle WebLogic Server, a product within the Fusion Middleware suite, contains an OS command injection vulnerability that allows an attacker to execute arbitrary code via a specially crafted HTTP request that includes a malicious XML document.
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
2024-06-24
Unknown
https://www.oracle.com/security-alerts/cpuapr2017.html; https://nvd.nist.gov/vuln/detail/CVE-2017-3506
CWE-78
CVE-2024-1086
Linux
Kernel
Linux Kernel Use-After-Free Vulnerability
2024-05-30
Linux kernel contains a use-after-free vulnerability in the netfilter: nf_tables component that allows an attacker to achieve local privilege escalation.
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
2024-06-20
Unknown
This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. Please check with specific vendors for information on patching status. For more information, please see: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f342de4e2f33e0e39165d8639387aa6c19dff660; https://nvd.nist.gov/vuln/detail/CVE-2024-1086
CWE-416
CVE-2024-24919
Check Point
Quantum Security Gateways
Check Point Quantum Security Gateways Information Disclosure Vulnerability
2024-05-30
Check Point Quantum Security Gateways contain an unspecified information disclosure vulnerability. The vulnerability potentially allows an attacker to access information on Gateways connected to the internet, with IPSec VPN, Remote Access VPN or Mobile Access enabled. This issue affects several product lines from Check Point, including CloudGuard Network, Quantum Scalable Chassis, Quantum Security Gateways, and Quantum Spark Appliances.
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
2024-06-20
Unknown
https://support.checkpoint.com/results/sk/sk182336; https://nvd.nist.gov/vuln/detail/CVE-2024-24919
CWE-200
CVE-2024-4978
Justice AV Solutions
Viewer
Justice AV Solutions (JAVS) Viewer Installer Embedded Malicious Code Vulnerability
2024-05-29
Justice AV Solutions (JAVS) Viewer installer contains a malicious version of ffmpeg.exe, named fffmpeg.exe (SHA256: 421a4ad2615941b177b6ec4ab5e239c14e62af2ab07c6df1741e2a62223223c4). When run, this creates a backdoor connection to a malicious C2 server.
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
2024-06-19
Unknown
Please follow the vendor’s instructions as outlined in the public statements at https://www.rapid7.com/blog/post/2024/05/23/cve-2024-4978-backdoored-justice-av-solutions-viewer-software-used-in-apparent-supply-chain-attack#remediation and https://www.javs.com/downloads; https://nvd.nist.gov/vuln/detail/CVE-2024-4978
CWE-506
CVE-2024-5274
Google
Chromium V8
Google Chromium V8 Type Confusion Vulnerability
2024-05-28
Google Chromium V8 contains a type confusion vulnerability that allows a remote attacker to execute code via a crafted HTML page. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera.
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
2024-06-18
Unknown
https://chromereleases.googleblog.com/2024/05/stable-channel-update-for-desktop_23.html?m=1; https://nvd.nist.gov/vuln/detail/CVE-2024-5274
CWE-843
CVE-2020-17519
Apache
Flink
Apache Flink Improper Access Control Vulnerability
2024-05-23
Apache Flink contains an improper access control vulnerability that allows an attacker to read any file on the local filesystem of the JobManager through its REST interface.
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
2024-06-13
Unknown
This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. Please check with specific vendors for information on patching status. For more information, please see: https://lists.apache.org/thread/typ0h03zyfrzjqlnb7plh64df1g2383d; https://nvd.nist.gov/vuln/detail/CVE-2020-17519
CWE-552
CVE-2024-4947
Google
Chromium V8
Google Chromium V8 Type Confusion Vulnerability
2024-05-20
Google Chromium V8 contains a type confusion vulnerability that allows a remote attacker to execute code via a crafted HTML page.
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
2024-06-10
Unknown
https://chromereleases.googleblog.com/2024/05/stable-channel-update-for-desktop_15.html; https://nvd.nist.gov/vuln/detail/CVE-2024-4947
CWE-843
CVE-2023-43208
NextGen Healthcare
Mirth Connect
NextGen Healthcare Mirth Connect Deserialization of Untrusted Data Vulnerability
2024-05-20
NextGen Healthcare Mirth Connect contains a deserialization of untrusted data vulnerability that allows for unauthenticated remote code execution via a specially crafted request.
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
2024-06-10
Unknown
This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. Please check with specific vendors for information on patching status. For more information, please see: https://github.com/nextgenhealthcare/connect/wiki/4.4.1---What%27s-New ; https://nvd.nist.gov/vuln/detail/CVE-2023-43208
CWE-502
CVE-2024-4761
Google
Chromium Visuals
Google Chromium V8 Out-of-Bounds Memory Write Vulnerability
2024-05-16
Google Chromium V8 Engine contains an unspecified out-of-bounds memory write vulnerability via a crafted HTML page. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera.
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
2024-06-06
Unknown
https://chromereleases.googleblog.com/2024/05/stable-channel-update-for-desktop_13.html; https://nvd.nist.gov/vuln/detail/CVE-2024-4761
CWE-787
CVE-2021-40655
D-Link
DIR-605 Router
D-Link DIR-605 Router Information Disclosure Vulnerability
2024-05-16
D-Link DIR-605 routers contain an information disclosure vulnerability that allows attackers to obtain a username and password by forging a post request to the /getcfg.php page.
This vulnerability affects legacy D-Link products. All associated hardware revisions have reached their end-of-life (EOL) or end-of-service (EOS) life cycle and should be retired and replaced per vendor instructions.
2024-06-06
Unknown
https://legacy.us.dlink.com/pages/product.aspx?id=2b09e95d90ff4cb38830ecc04c89cee5; https://nvd.nist.gov/vuln/detail/CVE-2021-40655
CWE-863
CVE-2014-100005
D-Link
DIR-600 Router
D-Link DIR-600 Router Cross-Site Request Forgery (CSRF) Vulnerability
2024-05-16
D-Link DIR-600 routers contain a cross-site request forgery (CSRF) vulnerability that allows an attacker to change router configurations by hijacking an existing administrator session.
This vulnerability affects legacy D-Link products. All associated hardware revisions have reached their end-of-life (EOL) or end-of-service (EOS) life cycle and should be retired and replaced per vendor instructions.
2024-06-06
Unknown
https://legacy.us.dlink.com/pages/product.aspx?id=4587b63118524aec911191cc81605283; https://nvd.nist.gov/vuln/detail/CVE-2014-100005
CWE-352
CVE-2024-30040
Microsoft
Windows
Microsoft Windows MSHTML Platform Security Feature Bypass Vulnerability
2024-05-14
Microsoft Windows MSHTML Platform contains an unspecified vulnerability that allows for a security feature bypass.
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
2024-06-04
Unknown
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30040; https://nvd.nist.gov/vuln/detail/CVE-2024-30040
CWE-20
CVE-2024-30051
Microsoft
DWM Core Library
Microsoft DWM Core Library Privilege Escalation Vulnerability
2024-05-14
Microsoft DWM Core Library contains a privilege escalation vulnerability that allows an attacker to gain SYSTEM privileges.
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
2024-06-04
Unknown
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30051; https://nvd.nist.gov/vuln/detail/CVE-2024-30051
CWE-122
CVE-2024-4671
Google
Chromium
Google Chromium Visuals Use-After-Free Vulnerability
2024-05-13
Google Chromium Visuals contains a use-after-free vulnerability that allows a remote attacker to exploit heap corruption via a crafted HTML page. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera.
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
2024-06-03
Unknown
https://chromereleases.googleblog.com/2024/05/stable-channel-update-for-desktop_9.html?m=1; https://nvd.nist.gov/vuln/detail/CVE-2024-4671
CWE-416
CVE-2023-7028
GitLab
GitLab CE/EE
GitLab Community and Enterprise Editions Improper Access Control Vulnerability
2024-05-01
GitLab Community and Enterprise Editions contain an improper access control vulnerability. This allows an attacker to trigger password reset emails to be sent to an unverified email address to ultimately facilitate an account takeover.
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
2024-05-22
Unknown
https://about.gitlab.com/releases/2024/01/11/critical-security-release-gitlab-16-7-2-released/ ; https://nvd.nist.gov/vuln/detail/CVE-2023-7028
CWE-284
CVE-2024-29988
Microsoft
SmartScreen Prompt
Microsoft SmartScreen Prompt Security Feature Bypass Vulnerability
2024-04-30
Microsoft SmartScreen Prompt contains a security feature bypass vulnerability that allows an attacker to bypass the Mark of the Web (MotW) feature. This vulnerability can be chained with CVE-2023-38831 and CVE-2024-21412 to execute a malicious file.
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
2024-05-21
Unknown
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29988; https://nvd.nist.gov/vuln/detail/CVE-2024-29988
CWE-693
End of preview. Expand in Data Studio

No dataset card yet

Downloads last month
15