U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.


The NVD is the U.S. government repository of standards based vulnerability management data represented using the Security Content Automation Protocol (SCAP). This data enables automation of vulnerability management, security measurement, and compliance. The NVD includes databases of security checklist references, security-related software flaws, product names, and impact metrics.

For information on how to cite the NVD, including the database's Digital Object Identifier (DOI), please consult NIST's Public Data Repository.

Last 20 Scored Vulnerability IDs & Summaries CVSS Severity
  • CVE-2024-53376 - CyberPanel before 2.3.8 allows remote authenticated users to execute arbitrary commands via shell metacharacters in the phpSelection field to the websites/submitWebsiteCreation URI.
    Published: December 15, 2024; 11:15:05 PM -0500

  • CVE-2024-56112 - CyberPanel (aka Cyber Panel) before f0cf648 allows XSS via token or username to plogical/phpmyadminsignin.php.
    Published: December 16, 2024; 1:15:07 AM -0500

  • CVE-2024-51112 - Open Redirect vulnerability in Pnetlab 5.3.11 allows an attacker to manipulate URLs to redirect users to arbitrary external websites via a crafted script
    Published: January 06, 2025; 11:15:28 AM -0500

  • CVE-2024-51111 - Cross-Site Scripting (XSS) vulnerability in Pnetlab 5.3.11 allows an attacker to inject malicious scripts into a web page, which are executed in the context of the victim's browser.
    Published: January 06, 2025; 11:15:28 AM -0500

  • CVE-2024-55529 - Z-BlogPHP 1.7.3 is vulnerable to arbitrary code execution via \zb_users\theme\shell\template.
    Published: January 06, 2025; 1:15:22 PM -0500

  • CVE-2024-55074 - The edit profile function of Grocy through 4.3.0 allows stored XSS and resultant privilege escalation by uploading a crafted HTML or SVG file, a different issue than CVE-2024-8370.
    Published: January 06, 2025; 3:15:39 PM -0500

    V3.1: 9.0 CRITICAL

  • CVE-2024-41206 - A stack-based buffer over-read in tsMuxer version nightly-2024-03-14-01-51-12 allows attackers to cause Information Disclosure via a crafted TS video file.
    Published: November 14, 2024; 6:15:05 PM -0500

  • CVE-2024-41209 - A heap-based buffer overflow in tsMuxer version nightly-2024-03-14-01-51-12 allows attackers to cause Denial of Service (DoS) and Code Execution via a crafted MOV video file.
    Published: November 14, 2024; 6:15:05 PM -0500

  • CVE-2024-41217 - A heap-based buffer overflow in tsMuxer version nightly-2024-05-10-02-00-45 allows attackers to cause Denial of Service (DoS) via a crafted MKV video file.
    Published: November 14, 2024; 6:15:05 PM -0500

  • CVE-2024-49776 - A negative-size-param in tsMuxer version nightly-2024-04-05-01-53-02 allows attackers to cause Denial of Service (DoS) via a crafted TS video file.
    Published: November 14, 2024; 6:15:05 PM -0500

  • CVE-2024-49777 - A heap-based buffer overflow in tsMuxer version nightly-2024-03-14-01-51-12 allows attackers to cause Denial of Service (DoS), Information Disclosure and Code Execution via a crafted MKV video file.
    Published: November 14, 2024; 6:15:05 PM -0500

  • CVE-2024-49778 - A heap-based buffer overflow in tsMuxer version nightly-2024-05-12-02-01-18 allows attackers to cause Denial of Service (DoS) and Code Execution via a crafted MOV video file.
    Published: November 14, 2024; 6:15:05 PM -0500

  • CVE-2024-52520 - Nextcloud Server is a self hosted personal cloud system. Due to a pre-flighted HEAD request, the link reference provider could be tricked into downloading bigger websites than intended, to find open-graph data. It is recommended that the Nextcloud... read CVE-2024-52520
    Published: November 15, 2024; 12:15:22 PM -0500

    V3.1: 6.5 MEDIUM

  • CVE-2024-52509 - Nextcloud Mail is the mail app for Nextcloud, a self-hosted productivity platform. The Nextcloud mail app incorrectly allowed attaching shared files without download permissions as attachments. This allowed users to send them the files to themselv... read CVE-2024-52509
    Published: November 15, 2024; 1:15:29 PM -0500

    V3.1: 5.7 MEDIUM

  • CVE-2024-10934 - In OpenBSD 7.5 before errata 008 and OpenBSD 7.4 before errata 021, avoid possible mbuf double free in NFS client and server implementation, do not use uninitialized variable in error handling of NFS server.
    Published: November 15, 2024; 3:15:17 PM -0500

  • CVE-2024-51503 - A security agent manual scan command injection vulnerability in the Trend Micro Deep Security 20 Agent could allow an attacker to escalate privileges and execute arbitrary code on an affected machine. In certain circumstances, attackers that have... read CVE-2024-51503
    Published: November 19, 2024; 2:15:08 PM -0500

    V3.1: 8.8 HIGH

  • CVE-2024-52802 - RIOT is an operating system for internet of things (IoT) devices. In version 2024.04 and prior, the function `_parse_advertise`, located in `/sys/net/application_layer/dhcpv6/client.c`, has no minimum header length check for `dhcpv6_opt_t` after p... read CVE-2024-52802
    Published: November 22, 2024; 11:15:34 AM -0500

  • CVE-2024-27919 - Envoy is a cloud-native, open-source edge and service proxy. In versions 1.29.0 and 1.29.1, theEnvoy HTTP/2 protocol stack is vulnerable to the flood of CONTINUATION frames. Envoy's HTTP/2 codec does not reset a request when header map limits have... read CVE-2024-27919
    Published: April 04, 2024; 11:15:38 AM -0400

  • CVE-2024-30255 - Envoy is a cloud-native, open source edge and service proxy. The HTTP/2 protocol stack in Envoy versions prior to 1.29.3, 1.28.2, 1.27.4, and 1.26.8 are vulnerable to CPU exhaustion due to flood of CONTINUATION frames. Envoy's HTTP/2 codec allows ... read CVE-2024-30255
    Published: April 04, 2024; 4:15:08 PM -0400

    V3.1: 7.5 HIGH

  • CVE-2024-32475 - Envoy is a cloud-native, open source edge and service proxy. When an upstream TLS cluster is used with `auto_sni` enabled, a request containing a `host`/`:authority` header longer than 255 characters triggers an abnormal termination of Envoy proce... read CVE-2024-32475
    Published: April 18, 2024; 11:15:30 AM -0400

Created September 20, 2022 , Updated August 27, 2024