Show filters
113,883 Total Results
Displaying 41-50 of 10,000
Refine your search criteria for more targeted results.
Sort by:
Attacker Value
Very High
CVE-2021-26857
Disclosure Date: March 03, 2021 (last updated February 22, 2025)
Microsoft Exchange Server Remote Code Execution Vulnerability
5
Attacker Value
Very High
CVE-2021-24085
Disclosure Date: February 25, 2021 (last updated November 28, 2024)
Microsoft Exchange Server Spoofing Vulnerability
7
Attacker Value
Low
CVE-2021-1647 Microsoft Windows Defender Zero-Day Vulnerability
Disclosure Date: January 12, 2021 (last updated December 29, 2023)
Microsoft Defender Remote Code Execution Vulnerability
7
Attacker Value
Very High
CVE-2020-16952 — Microsoft SharePoint Remote Code Execution Vulnerabilities
Disclosure Date: October 16, 2020 (last updated January 01, 2024)
<p>A remote code execution vulnerability exists in Microsoft SharePoint when the software fails to check the source markup of an application package. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the SharePoint application pool and the SharePoint server farm account.</p>
<p>Exploitation of this vulnerability requires that a user uploads a specially crafted SharePoint application package to an affected version of SharePoint.</p>
<p>The security update addresses the vulnerability by correcting how SharePoint checks the source markup of application packages.</p>
7
Attacker Value
Very High
CVE-2020-12271: Sophos XG Firewall Pre-Auth SQL Injection Vulnerability
Disclosure Date: April 27, 2020 (last updated February 21, 2025)
A SQL injection issue was found in SFOS 17.0, 17.1, 17.5, and 18.0 before 2020-04-25 on Sophos XG Firewall devices, as exploited in the wild in April 2020. This affected devices configured with either the administration (HTTPS) service or the User Portal exposed on the WAN zone. A successful attack may have caused remote code execution that exfiltrated usernames and hashed passwords for the local device admin(s), portal admins, and user accounts used for remote access (but not external Active Directory or LDAP passwords)
5
Attacker Value
Very High
CVE-2024-24919
Disclosure Date: May 28, 2024 (last updated June 01, 2024)
Potentially allowing an attacker to read certain information on Check Point Security Gateways once connected to the internet and enabled with remote Access VPN or Mobile Access Software Blades. A Security fix that mitigates this vulnerability is available.
6
Attacker Value
Very High
CVE-2024-3094
Disclosure Date: March 29, 2024 (last updated April 18, 2024)
Malicious code was discovered in the upstream tarballs of xz, starting with version 5.6.0.
Through a series of complex obfuscations, the liblzma build process extracts a prebuilt object file from a disguised test file existing in the source code, which is then used to modify specific functions in the liblzma code. This results in a modified liblzma library that can be used by any software linked against this library, intercepting and modifying the data interaction with this library.
5
Attacker Value
Very High
CVE-2023-46805
Disclosure Date: January 12, 2024 (last updated January 16, 2024)
An authentication bypass vulnerability in the web component of Ivanti ICS 9.x, 22.x and Ivanti Policy Secure allows a remote attacker to access restricted resources by bypassing control checks.
7
Attacker Value
High
CVE-2022-22965
Disclosure Date: April 01, 2022 (last updated February 23, 2025)
A Spring MVC or Spring WebFlux application running on JDK 9+ may be vulnerable to remote code execution (RCE) via data binding. The specific exploit requires the application to run on Tomcat as a WAR deployment. If the application is deployed as a Spring Boot executable jar, i.e. the default, it is not vulnerable to the exploit. However, the nature of the vulnerability is more general, and there may be other ways to exploit it.
7
Attacker Value
Moderate
CVE-2022-0342
Disclosure Date: March 28, 2022 (last updated February 23, 2025)
An authentication bypass vulnerability in the CGI program of Zyxel USG/ZyWALL series firmware versions 4.20 through 4.70, USG FLEX series firmware versions 4.50 through 5.20, ATP series firmware versions 4.32 through 5.20, VPN series firmware versions 4.30 through 5.20, and NSG series firmware versions V1.20 through V1.33 Patch 4, which could allow an attacker to bypass the web authentication and obtain administrative access of the device.
6