Vulnerabilities (CVE)

Total 81955 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2024-43447 1 Microsoft 1 Windows Server 2022 2024-11-19 N/A 8.1 HIGH
Windows SMBv3 Server Remote Code Execution Vulnerability
CVE-2024-43450 1 Microsoft 7 Windows Server 2008, Windows Server 2012, Windows Server 2016 and 4 more 2024-11-19 N/A 7.5 HIGH
Windows DNS Spoofing Vulnerability
CVE-2024-43452 1 Microsoft 11 Windows 10 1809, Windows 10 21h2, Windows 10 22h2 and 8 more 2024-11-19 N/A 7.5 HIGH
Windows Registry Elevation of Privilege Vulnerability
CVE-2024-43459 1 Microsoft 3 Sql Server 2016, Sql Server 2017, Sql Server 2019 2024-11-19 N/A 8.8 HIGH
SQL Server Native Client Remote Code Execution Vulnerability
CVE-2021-41737 2024-11-19 N/A 7.5 HIGH
In Faust 2.23.1, an input file with the lines "// r visualisation tCst" and "//process = +: L: abM-^Q;" and "process = route(3333333333333333333,2,1,2,3,1) : *;" leads to stack consumption.
CVE-2024-43462 1 Microsoft 3 Sql Server 2016, Sql Server 2017, Sql Server 2019 2024-11-19 N/A 8.8 HIGH
SQL Server Native Client Remote Code Execution Vulnerability
CVE-2024-43499 3 Apple, Linux, Microsoft 5 Macos, Linux Kernel, .net and 2 more 2024-11-19 N/A 7.5 HIGH
.NET and Visual Studio Denial of Service Vulnerability
CVE-2024-11208 1 Apereo 1 Central Authentication Service 2024-11-19 2.6 LOW 8.1 HIGH
A vulnerability was found in Apereo CAS 6.6 and classified as problematic. Affected by this issue is some unknown functionality of the file /login?service. The manipulation leads to session expiration. The attack may be launched remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
CVE-2024-48993 1 Microsoft 3 Sql Server 2016, Sql Server 2017, Sql Server 2019 2024-11-19 N/A 8.8 HIGH
SQL Server Native Client Remote Code Execution Vulnerability
CVE-2024-11211 1 Eyoucms 1 Eyoucms 2024-11-19 5.8 MEDIUM 7.2 HIGH
A vulnerability classified as critical has been found in EyouCMS up to 1.6.7. Affected is an unknown function of the component Website Logo Handler. The manipulation leads to unrestricted upload. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
CVE-2024-49256 1 Wpchill 1 Htaccess File Editor 2024-11-19 N/A 8.8 HIGH
Incorrect Authorization vulnerability in WPChill Htaccess File Editor allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Htaccess File Editor: from n/a through 1.0.18.
CVE-2024-52291 1 Craftcms 1 Craft Cms 2024-11-19 N/A 7.2 HIGH
Craft is a content management system (CMS). A vulnerability in CraftCMS allows an attacker to bypass local file system validation by utilizing a double file:// scheme (e.g., file://file:////). This enables the attacker to specify sensitive folders as the file system, leading to potential file overwriting through malicious uploads, unauthorized access to sensitive files, and, under certain conditions, remote code execution (RCE) via Server-Side Template Injection (SSTI) payloads. Note that this will only work if you have an authenticated administrator account with allowAdminChanges enabled. This is fixed in 5.4.6 and 4.12.5.
CVE-2024-42392 1 Cesanta 1 Mongoose 2024-11-19 N/A 7.5 HIGH
Improper Neutralization of Delimiters vulnerability in Cesanta Mongoose Web Server v7.14 allows to trigger an infinite loop bug if the input string contains unexpected characters.
CVE-2024-42385 1 Cesanta 1 Mongoose 2024-11-19 N/A 7.0 HIGH
Improper Neutralization of Delimiters vulnerability in Cesanta Mongoose Web Server v7.14 allows to trigger an out-of-bound memory write if the PEM certificate contains unexpected characters.
CVE-2024-42386 1 Cesanta 1 Mongoose 2024-11-19 N/A 7.5 HIGH
Use of Out-of-range Pointer Offset vulnerability in Cesanta Mongoose Web Server v7.14 allows an attacker to send an unexpected TLS packet and produce a segmentation fault on the application.
CVE-2024-52293 1 Craftcms 1 Craft Cms 2024-11-19 N/A 7.2 HIGH
Craft is a content management system (CMS). Prior to 4.12.2 and 5.4.3, Craft is missing normalizePath in the function FileHelper::absolutePath could lead to Remote Code Execution on the server via twig SSTI. This is a sequel to CVE-2023-40035. This vulnerability is fixed in 4.12.2 and 5.4.3.
CVE-2024-25253 2024-11-19 N/A 7.5 HIGH
Driver Booster v10.6 was discovered to contain a buffer overflow via the Host parameter under the Customize proxy module.
CVE-2021-3742 1 Chatwoot 1 Chatwoot 2024-11-19 N/A 8.8 HIGH
A Server-Side Request Forgery (SSRF) vulnerability was discovered in chatwoot/chatwoot, affecting all versions prior to 2.5.0. The vulnerability allows an attacker to upload an SVG file containing a malicious SSRF payload. When the SVG file is used as an avatar and opened in a new tab, it can trigger the SSRF, potentially leading to host redirection.
CVE-2024-10800 1 Vanquish 1 User Extra Fields 2024-11-19 N/A 8.8 HIGH
The WordPress User Extra Fields plugin for WordPress is vulnerable to privilege escalation due to a missing capability check on the ajax_save_fields() function in all versions up to, and including, 16.6. This makes it possible for authenticated attackers, with subscriber-level access and above, to add custom fields that can be updated and then use the check_and_overwrite_wp_or_woocommerce_fields function to update the wp_capabilities field to have administrator privileges.
CVE-2024-10311 1 Cmorillas1 1 External Database Based Actions 2024-11-19 N/A 8.8 HIGH
The External Database Based Actions plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 0.1. This is due to a missing capability check in the 'edba_admin_handle' function. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to update the plugin settings and log in as any existing user on the site, such as an administrator.