Show filters
181,193 Total Results
Displaying 121-130 of 10,000
Refine your search criteria for more targeted results.
Sort by:
Attacker Value
Very High
CVE-2024-47575
Disclosure Date: October 23, 2024 (last updated January 15, 2025)
A missing authentication for critical function in FortiManager 7.6.0, FortiManager 7.4.0 through 7.4.4, FortiManager 7.2.0 through 7.2.7, FortiManager 7.0.0 through 7.0.12, FortiManager 6.4.0 through 6.4.14, FortiManager 6.2.0 through 6.2.12, Fortinet FortiManager Cloud 7.4.1 through 7.4.4, FortiManager Cloud 7.2.1 through 7.2.7, FortiManager Cloud 7.0.1 through 7.0.12, FortiManager Cloud 6.4.1 through 6.4.7 allows attacker to execute arbitrary code or commands via specially crafted requests.
5
Attacker Value
Very High
CVE-2024-28995
Disclosure Date: June 06, 2024 (last updated February 26, 2025)
SolarWinds Serv-U was susceptible to a directory transversal vulnerability that would allow access to read sensitive files on the host machine.
5
Attacker Value
Very High
CVE-2024-2054
Disclosure Date: March 21, 2024 (last updated February 26, 2025)
The Artica-Proxy administrative web application will deserialize arbitrary PHP objects supplied by unauthenticated users and subsequently enable code execution as the "www-data" user.
4
Attacker Value
Moderate
CVE-2024-21413
Disclosure Date: February 13, 2024 (last updated February 26, 2025)
Microsoft Outlook Remote Code Execution Vulnerability
5
Attacker Value
High
CVE-2024-23334
Disclosure Date: January 29, 2024 (last updated February 26, 2025)
aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. When using aiohttp as a web server and configuring static routes, it is necessary to specify the root path for static files. Additionally, the option 'follow_symlinks' can be used to determine whether to follow symbolic links outside the static root directory. When 'follow_symlinks' is set to True, there is no validation to check if reading a file is within the root directory. This can lead to directory traversal vulnerabilities, resulting in unauthorized access to arbitrary files on the system, even when symlinks are not present. Disabling follow_symlinks and using a reverse proxy are encouraged mitigations. Version 3.9.2 fixes this issue.
3
Attacker Value
Very High
CVE-2024-21887
Disclosure Date: January 12, 2024 (last updated February 26, 2025)
A command injection vulnerability in web components of Ivanti Connect Secure (9.x, 22.x) and Ivanti Policy Secure (9.x, 22.x) allows an authenticated administrator to send specially crafted requests and execute arbitrary commands on the appliance.
5
Attacker Value
Very High
CVE-2023-7102
Disclosure Date: December 24, 2023 (last updated February 25, 2025)
Use of a Third Party library produced a vulnerability in Barracuda Networks Inc. Barracuda ESG Appliance which allowed Parameter Injection.This issue affected Barracuda ESG Appliance, from 5.1.3.001 through 9.2.1.001, until Barracuda removed the vulnerable logic.
4
Attacker Value
High
CVE-2023-4911
Disclosure Date: October 03, 2023 (last updated February 25, 2025)
A buffer overflow was discovered in the GNU C Library's dynamic loader ld.so while processing the GLIBC_TUNABLES environment variable. This issue could allow a local attacker to use maliciously crafted GLIBC_TUNABLES environment variables when launching binaries with SUID permission to execute code with elevated privileges.
4
Attacker Value
High
CVE-2023-41265
Disclosure Date: August 29, 2023 (last updated February 25, 2025)
An HTTP Request Tunneling vulnerability found in Qlik Sense Enterprise for Windows for versions May 2023 Patch 3 and earlier, February 2023 Patch 7 and earlier, November 2022 Patch 10 and earlier, and August 2022 Patch 12 and earlier allows a remote attacker to elevate their privilege by tunneling HTTP requests in the raw HTTP request. This allows them to send requests that get executed by the backend server hosting the repository application. This is fixed in August 2023 IR, May 2023 Patch 4, February 2023 Patch 8, November 2022 Patch 11, and August 2022 Patch 13.
5
Attacker Value
Moderate
CVE-2023-29336
Disclosure Date: May 09, 2023 (last updated February 24, 2025)
Win32k Elevation of Privilege Vulnerability
4