U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Results (Refine Search)

Search Parameters:
There are 231,656 matching records.
Displaying matches 941 through 960.
Vuln ID Summary CVSS Severity
CVE-2024-31455

Minder by Stacklok is an open source software supply chain security platform. A refactoring in commit `5c381cf` added the ability to get GitHub repositories registered to a project without specifying a specific provider. Unfortunately, the SQL query for doing so was missing parenthesis, and would select a random repository. This issue is patched in pull request 2941. As a workaround, revert prior to `5c381cf`, or roll forward past `2eb94e7`.

Published: April 09, 2024; 1:16:03 PM -0400
V3.x:(not available)
V2.0:(not available)
CVE-2024-30262

Contao is an open source content management system. Prior to version 4.13.40, when a frontend member changes their password in the personal data or the password lost module, the corresponding remember-me tokens are not removed. If someone compromises an account and is able to get a remember-me token, changing the password would not be enough to reclaim control over the account. Version 4.13.40 contains a fix for the issue. As a workaround, disable "Allow auto login" in the login module.

Published: April 09, 2024; 1:16:02 PM -0400
V3.x:(not available)
V2.0:(not available)
CVE-2024-29993

Azure CycleCloud Elevation of Privilege Vulnerability

Published: April 09, 2024; 1:16:02 PM -0400
V3.1: 8.8 HIGH
V2.0:(not available)
CVE-2024-29992

Azure Identity Library for .NET Information Disclosure Vulnerability

Published: April 09, 2024; 1:16:02 PM -0400
V3.1: 5.5 MEDIUM
V2.0:(not available)
CVE-2024-29990

Microsoft Azure Kubernetes Service Confidential Container Elevation of Privilege Vulnerability

Published: April 09, 2024; 1:16:02 PM -0400
V3.1: 9.0 CRITICAL
V2.0:(not available)
CVE-2024-29989

Azure Monitor Agent Elevation of Privilege Vulnerability

Published: April 09, 2024; 1:16:02 PM -0400
V3.1: 8.4 HIGH
V2.0:(not available)
CVE-2024-29988

SmartScreen Prompt Security Feature Bypass Vulnerability

Published: April 09, 2024; 1:16:01 PM -0400
V3.1: 8.8 HIGH
V2.0:(not available)
CVE-2024-29985

Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability

Published: April 09, 2024; 1:16:01 PM -0400
V3.1: 8.8 HIGH
V2.0:(not available)
CVE-2024-29984

Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability

Published: April 09, 2024; 1:16:01 PM -0400
V3.1: 8.8 HIGH
V2.0:(not available)
CVE-2024-29983

Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability

Published: April 09, 2024; 1:16:01 PM -0400
V3.x:(not available)
V2.0:(not available)
CVE-2024-29982

Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability

Published: April 09, 2024; 1:16:01 PM -0400
V3.1: 8.8 HIGH
V2.0:(not available)
CVE-2024-29905

DIRAC is an interware, meaning a software framework for distributed computing. Prior to version 8.0.41, during the proxy generation process (e.g., when using `dirac-proxy-init`), it is possible for unauthorized users on the same machine to gain read access to the proxy. This allows the user to then perform any action that is possible with the original proxy. This vulnerability only exists for a short period of time (sub-millsecond) during the generation process. Version 8.0.41 contains a patch for the issue. As a workaround, setting the `X509_USER_PROXY` environment variable to a path that is inside a directory that is only readable to the current user avoids the potential risk. After the file has been written, it can be safely copied to the standard location (`/tmp/x509up_uNNNN`).

Published: April 09, 2024; 1:16:00 PM -0400
V3.x:(not available)
V2.0:(not available)
CVE-2024-29066

Windows Distributed File System (DFS) Remote Code Execution Vulnerability

Published: April 09, 2024; 1:16:00 PM -0400
V3.1: 7.2 HIGH
V2.0:(not available)
CVE-2024-29064

Windows Hyper-V Denial of Service Vulnerability

Published: April 09, 2024; 1:16:00 PM -0400
V3.x:(not available)
V2.0:(not available)
CVE-2024-29063

Azure AI Search Information Disclosure Vulnerability

Published: April 09, 2024; 1:16:00 PM -0400
V3.1: 7.3 HIGH
V2.0:(not available)
CVE-2024-29062

Secure Boot Security Feature Bypass Vulnerability

Published: April 09, 2024; 1:15:59 PM -0400
V3.1: 7.1 HIGH
V2.0:(not available)
CVE-2024-29061

Secure Boot Security Feature Bypass Vulnerability

Published: April 09, 2024; 1:15:59 PM -0400
V3.1: 7.8 HIGH
V2.0:(not available)
CVE-2024-29056

Windows Authentication Elevation of Privilege Vulnerability

Published: April 09, 2024; 1:15:59 PM -0400
V3.1: 4.3 MEDIUM
V2.0:(not available)
CVE-2024-29055

Microsoft Defender for IoT Elevation of Privilege Vulnerability

Published: April 09, 2024; 1:15:59 PM -0400
V3.1: 7.2 HIGH
V2.0:(not available)
CVE-2024-29054

Microsoft Defender for IoT Elevation of Privilege Vulnerability

Published: April 09, 2024; 1:15:59 PM -0400
V3.1: 7.2 HIGH
V2.0:(not available)