Show filters
71,465 Total Results
Displaying 661-670 of 10,000
Refine your search criteria for more targeted results.
Sort by:
Attacker Value
Unknown
CVE-2024-9487
Disclosure Date: October 10, 2024 (last updated November 16, 2024)
An improper verification of cryptographic signature vulnerability was identified in GitHub Enterprise Server that allowed SAML SSO authentication to be bypassed resulting in unauthorized provisioning of users and access to the instance. Exploitation required the encrypted assertions feature to be enabled, and the attacker would require direct network access as well as a signed SAML response or metadata document. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.15 and was fixed in versions 3.11.16, 3.12.10, 3.13.5, and 3.14.2. This vulnerability was reported via the GitHub Bug Bounty program.
1
Attacker Value
Unknown
CVE-2024-0132
Disclosure Date: September 26, 2024 (last updated October 03, 2024)
NVIDIA Container Toolkit 1.16.1 or earlier contains a Time-of-check Time-of-Use (TOCTOU) vulnerability when used with default configuration where a specifically crafted container image may gain access to the host file system. This does not impact use cases where CDI is used. A successful exploit of this vulnerability may lead to code execution, denial of service, escalation of privileges, information disclosure, and data tampering.
1
Attacker Value
Unknown
CVE-2024-38813
Disclosure Date: September 17, 2024 (last updated October 03, 2024)
The vCenter Server contains a privilege escalation vulnerability. A malicious actor with network access to vCenter Server may trigger this vulnerability to escalate privileges to root by sending a specially crafted network packet.
1
Attacker Value
Unknown
CVE-2024-7593
Disclosure Date: August 13, 2024 (last updated September 07, 2024)
Incorrect implementation of an authentication algorithm in Ivanti vTM other than versions 22.2R1 or 22.7R2 allows a remote unauthenticated attacker to bypass authentication of the admin panel.
1
Attacker Value
Unknown
CVE-2024-38213
Disclosure Date: August 13, 2024 (last updated August 15, 2024)
Windows Mark of the Web Security Feature Bypass Vulnerability
1
Attacker Value
Unknown
CVE-2024-7264
Disclosure Date: July 31, 2024 (last updated August 13, 2024)
libcurl's ASN1 parser code has the `GTime2str()` function, used for parsing an
ASN.1 Generalized Time field. If given an syntactically incorrect field, the
parser might end up using -1 for the length of the *time fraction*, leading to
a `strlen()` getting performed on a pointer to a heap buffer area that is not
(purposely) null terminated.
This flaw most likely leads to a crash, but can also lead to heap contents
getting returned to the application when
[CURLINFO_CERTINFO](https://curl.se/libcurl/c/CURLINFO_CERTINFO.html) is used.
1
Attacker Value
Unknown
CVE-2024-38021
Disclosure Date: July 09, 2024 (last updated July 12, 2024)
Microsoft Outlook Remote Code Execution Vulnerability
1
Attacker Value
Unknown
CVE-2024-37079
Disclosure Date: June 18, 2024 (last updated August 31, 2024)
vCenter Server contains a heap-overflow vulnerability in the implementation of the DCERPC protocol. A malicious actor with network access to vCenter Server may trigger this vulnerability by sending a specially crafted network packet potentially leading to remote code execution.
1
Attacker Value
Unknown
CVE-2024-30300
Disclosure Date: June 13, 2024 (last updated July 16, 2024)
Adobe Framemaker Publishing Server versions 2020.3, 2022.2 and earlier are affected by an Information Exposure vulnerability (CWE-200) that could lead to privilege escalation. An attacker could exploit this vulnerability to gain access to sensitive information which may include system or user privileges. Exploitation of this issue does not require user interaction.
1
Attacker Value
Unknown
CVE-2024-30299
Disclosure Date: June 13, 2024 (last updated July 16, 2024)
Adobe Framemaker Publishing Server versions 2020.3, 2022.2 and earlier are affected by an Improper Authentication vulnerability that could result in privilege escalation. An attacker could exploit this vulnerability to gain unauthorized access or elevated privileges within the application. Exploitation of this issue does not require user interaction.
1