Show filters
93,947 Total Results
Displaying 301-310 of 10,000
Refine your search criteria for more targeted results.
Sort by:
Attacker Value
Very High
CVE-2024-53704
Disclosure Date: January 09, 2025 (last updated February 27, 2025)
An Improper Authentication vulnerability in the SSLVPN authentication mechanism allows a remote attacker to bypass authentication.
2
Attacker Value
Very High
CVE-2024-49112
Disclosure Date: December 12, 2024 (last updated February 27, 2025)
Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability
2
Attacker Value
Low
CVE-2024-44000
Disclosure Date: October 20, 2024 (last updated February 26, 2025)
Insufficiently Protected Credentials vulnerability in LiteSpeed Technologies LiteSpeed Cache allows Authentication Bypass.This issue affects LiteSpeed Cache: from n/a before 6.5.0.1.
2
Attacker Value
Very High
CVE-2024-41874
Disclosure Date: September 13, 2024 (last updated February 26, 2025)
ColdFusion versions 2023.9, 2021.15 and earlier are affected by a Deserialization of Untrusted Data vulnerability that could result in arbitrary code execution in the context of the current user. An attacker could exploit this vulnerability by providing crafted input to the application, which when deserialized, leads to execution of malicious code. Exploitation of this issue does not require user interaction.
2
Attacker Value
Very High
CVE-2024-40711
Disclosure Date: September 07, 2024 (last updated February 26, 2025)
A deserialization of untrusted data vulnerability with a malicious payload can allow an unauthenticated remote code execution (RCE).
2
Attacker Value
High
CVE-2024-6327
Disclosure Date: July 24, 2024 (last updated February 26, 2025)
In Progress® Telerik® Report Server versions prior to 2024 Q2 (10.1.24.709), a remote code execution attack is possible through an insecure deserialization vulnerability.
2
Attacker Value
High
CVE-2024-5217
Disclosure Date: July 10, 2024 (last updated February 26, 2025)
ServiceNow has addressed an input validation vulnerability that was identified in the Washington DC, Vancouver, and earlier Now Platform releases. This vulnerability could enable an unauthenticated user to remotely execute code within the context of the Now Platform. The vulnerability is addressed in the listed patches and hot fixes below, which were released during the June 2024 patching cycle. If you have not done so already, we recommend applying security patches relevant to your instance as soon as possible.
2
Attacker Value
Unknown
CVE-2024-30103
Disclosure Date: June 11, 2024 (last updated February 26, 2025)
Microsoft Outlook Remote Code Execution Vulnerability
3
Attacker Value
High
CVE-2024-4577
Disclosure Date: June 09, 2024 (last updated February 26, 2025)
In PHP versions 8.1.* before 8.1.29, 8.2.* before 8.2.20, 8.3.* before 8.3.8, when using Apache and PHP-CGI on Windows, if the system is set up to use certain code pages, Windows may use "Best-Fit" behavior to replace characters in command line given to Win32 API functions. PHP CGI module may misinterpret those characters as PHP options, which may allow a malicious user to pass options to PHP binary being run, and thus reveal the source code of scripts, run arbitrary PHP code on the server, etc.
2
Attacker Value
Very High
CVE-2024-4358
Disclosure Date: May 29, 2024 (last updated February 26, 2025)
In Progress Telerik Report Server, version 2024 Q1 (10.0.24.305) or earlier, on IIS, an unauthenticated attacker can gain access to Telerik Report Server restricted functionality via an authentication bypass vulnerability.
2