Total
10511 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2024-20659 | 1 Microsoft | 10 Windows 10 1809, Windows 10 21h2, Windows 10 22h2 and 7 more | 2025-01-10 | N/A | 7.1 HIGH |
Windows Hyper-V Security Feature Bypass Vulnerability | |||||
CVE-2024-30092 | 1 Microsoft | 12 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 9 more | 2025-01-10 | N/A | 8.0 HIGH |
Windows Hyper-V Remote Code Execution Vulnerability | |||||
CVE-2024-39281 | 2025-01-10 | N/A | 5.3 MEDIUM | ||
The command ctl_persistent_reserve_out allows the caller to specify an arbitrary size which will be passed to the kernel's memory allocator. | |||||
CVE-2023-23754 | 1 Joomla | 1 Joomla\! | 2025-01-09 | N/A | 6.1 MEDIUM |
An issue was discovered in Joomla! 4.2.0 through 4.3.1. Lack of input validation caused an open redirect and XSS issue within the new mfa selection screen. | |||||
CVE-2017-15832 | 1 Qualcomm | 10 Mdm9206, Mdm9206 Firmware, Mdm9607 and 7 more | 2025-01-09 | N/A | 8.4 HIGH |
Buffer overwrite in the WLAN host driver by leveraging a compromised WLAN FW | |||||
CVE-2024-25970 | 1 Dell | 1 Powerscale Onefs | 2025-01-09 | N/A | 6.5 MEDIUM |
Dell PowerScale OneFS versions 8.2.x through 9.7.0.1 contains an improper input validation vulnerability. A low privileged remote attacker could potentially exploit this vulnerability, leading to loss of integrity. | |||||
CVE-2024-52286 | 2025-01-09 | N/A | N/A | ||
Stirling-PDF is a locally hosted web application that allows you to perform various operations on PDF files. In affected versions the Merge functionality takes untrusted user input (file name) and uses it directly in the creation of HTML pages allowing any unauthenticated to execute JavaScript code in the context of the user. The issue stems to the code starting at `Line 24` in `src/main/resources/static/js/merge.js`. The file name is directly being input into InnerHTML with no sanitization on the file name, allowing a malicious user to be able to upload files with names containing HTML tags. As HTML tags can include JavaScript code, this can be used to execute JavaScript code in the context of the user. This is a self-injection style attack and relies on a user uploading the malicious file themselves and it impact only them, not other users. A user might be social engineered into running this to launch a phishing attack. Nevertheless, this breaks the expected security restrictions in place by the application. This issue has been addressed in version 0.32.0 and all users are advised to upgrade. There are no known workarounds for this vulnerability. | |||||
CVE-2024-28855 | 1 Zitadel | 1 Zitadel | 2025-01-08 | N/A | 8.1 HIGH |
ZITADEL, open source authentication management software, uses Go templates to render the login UI. Due to a improper use of the `text/template` instead of the `html/template` package, the Login UI did not sanitize input parameters prior to versions 2.47.3, 2.46.1, 2.45.1, 2.44.3, 2.43.9, 2.42.15, and 2.41.15. An attacker could create a malicious link, where he injected code which would be rendered as part of the login screen. While it was possible to inject HTML including JavaScript, the execution of such scripts would be prevented by the Content Security Policy. Versions 2.47.3, 2.46.1, 2.45.1, 2.44.3, 2.43.9, 2.42.15, and 2.41.15 contain a patch for this issue. No known workarounds are available. | |||||
CVE-2024-30054 | 1 Microsoft | 1 Powerbi-javascript | 2025-01-08 | N/A | 6.5 MEDIUM |
Microsoft Power BI Client JavaScript SDK Information Disclosure Vulnerability | |||||
CVE-2024-20670 | 1 Microsoft | 2 Outlook, Windows | 2025-01-08 | N/A | 8.1 HIGH |
Outlook for Windows Spoofing Vulnerability | |||||
CVE-2025-22137 | 2025-01-08 | N/A | 9.8 CRITICAL | ||
Pingvin Share is a self-hosted file sharing platform and an alternative for WeTransfer. This vulnerability allows an authenticated or unauthenticated (if anonymous shares are allowed) user to overwrite arbitrary files on the server, including sensitive system files, via HTTP POST requests. The issue has been patched in version 1.4.0. | |||||
CVE-2024-26189 | 1 Microsoft | 13 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 10 more | 2025-01-08 | N/A | 8.0 HIGH |
Secure Boot Security Feature Bypass Vulnerability | |||||
CVE-2024-28897 | 1 Microsoft | 13 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 10 more | 2025-01-08 | N/A | 6.8 MEDIUM |
Secure Boot Security Feature Bypass Vulnerability | |||||
CVE-2024-26253 | 1 Microsoft | 14 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 11 more | 2025-01-08 | N/A | 6.8 MEDIUM |
Windows rndismp6.sys Remote Code Execution Vulnerability | |||||
CVE-2024-26240 | 1 Microsoft | 14 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 11 more | 2025-01-08 | N/A | 8.0 HIGH |
Secure Boot Security Feature Bypass Vulnerability | |||||
CVE-2024-49073 | 1 Microsoft | 9 Windows 10 1809, Windows 10 21h2, Windows 10 22h2 and 6 more | 2025-01-08 | N/A | 6.8 MEDIUM |
Windows Mobile Broadband Driver Elevation of Privilege Vulnerability | |||||
CVE-2024-49057 | 1 Microsoft | 1 Defender For Endpoint | 2025-01-08 | N/A | 8.1 HIGH |
Microsoft Defender for Endpoint on Android Spoofing Vulnerability | |||||
CVE-2024-49087 | 1 Microsoft | 9 Windows 10 1809, Windows 10 21h2, Windows 10 22h2 and 6 more | 2025-01-08 | N/A | 4.6 MEDIUM |
Windows Mobile Broadband Driver Information Disclosure Vulnerability | |||||
CVE-2024-47934 | 2025-01-08 | N/A | 5.3 MEDIUM | ||
Improper Input Validation vulnerability in Management Program in TXOne Networks Portable Inspector and Portable Inspector Pro Edition allows remote attacker to crash management service. The Denial of Service situation can be resolved by restarting the management service. This issue affects Portable Inspector: through 1.0.0; Portable Inspector Pro Edition: through 1.0.0. | |||||
CVE-2024-51741 | 2025-01-06 | N/A | 4.4 MEDIUM | ||
Redis is an open source, in-memory database that persists on disk. An authenticated with sufficient privileges may create a malformed ACL selector which, when accessed, triggers a server panic and subsequent denial of service. The problem is fixed in Redis 7.2.7 and 7.4.2. |