Search Results (Refine Search)
- Results Type: Overview
- Search Type: Search All
- CVSS Version: 3
- CVSS V3 Severity: Critical (9-10)
Vuln ID | Summary | CVSS Severity |
---|---|---|
CVE-2023-39367 |
An OS command injection vulnerability exists in the web interface mac2name functionality of Peplink Smart Reader v1.2.0 (in QEMU). A specially crafted HTTP request can lead to arbitrary command execution. An attacker can make an authenticated HTTP request to trigger this vulnerability. Published: April 17, 2024; 9:15:06 AM -0400 |
V3.1: 9.1 CRITICAL V2.0:(not available) |
CVE-2024-21082 |
Vulnerability in the Oracle BI Publisher product of Oracle Analytics (component: XML Services). Supported versions that are affected are 7.0.0.0.0 and 12.2.1.4.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle BI Publisher. Successful attacks of this vulnerability can result in takeover of Oracle BI Publisher. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). Published: April 16, 2024; 6:15:27 PM -0400 |
V3.1: 9.8 CRITICAL V2.0:(not available) |
CVE-2024-21071 |
Vulnerability in the Oracle Workflow product of Oracle E-Business Suite (component: Admin Screens and Grants UI). Supported versions that are affected are 12.2.3-12.2.13. Easily exploitable vulnerability allows high privileged attacker with network access via HTTP to compromise Oracle Workflow. While the vulnerability is in Oracle Workflow, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle Workflow. CVSS 3.1 Base Score 9.1 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H). Published: April 16, 2024; 6:15:25 PM -0400 |
V3.1: 9.1 CRITICAL V2.0:(not available) |
CVE-2024-21014 |
Vulnerability in the Oracle Hospitality Simphony product of Oracle Food and Beverage Applications (component: Simphony Enterprise Server). Supported versions that are affected are 19.1.0-19.5.4. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Hospitality Simphony. Successful attacks of this vulnerability can result in takeover of Oracle Hospitality Simphony. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). Published: April 16, 2024; 6:15:15 PM -0400 |
V3.1: 9.8 CRITICAL V2.0:(not available) |
CVE-2024-21010 |
Vulnerability in the Oracle Hospitality Simphony product of Oracle Food and Beverage Applications (component: Simphony Enterprise Server). Supported versions that are affected are 19.1.0-19.5.4. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Hospitality Simphony. While the vulnerability is in Oracle Hospitality Simphony, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle Hospitality Simphony. CVSS 3.1 Base Score 9.9 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H). Published: April 16, 2024; 6:15:15 PM -0400 |
V3.1: 9.9 CRITICAL V2.0:(not available) |
CVE-2024-20997 |
Vulnerability in the Oracle Hospitality Simphony product of Oracle Food and Beverage Applications (component: Simphony Enterprise Server). Supported versions that are affected are 19.1.0-19.5.4. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Hospitality Simphony. While the vulnerability is in Oracle Hospitality Simphony, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle Hospitality Simphony. CVSS 3.1 Base Score 9.9 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H). Published: April 16, 2024; 6:15:12 PM -0400 |
V3.1: 9.9 CRITICAL V2.0:(not available) |
CVE-2024-3777 |
The password reset feature of Ai3 QbiBot lacks proper access control, allowing unauthenticated remote attackers to reset any user's password. Published: April 15, 2024; 12:15:16 AM -0400 |
V3.1: 9.8 CRITICAL V2.0:(not available) |
CVE-2024-3400 |
A command injection as a result of arbitrary file creation vulnerability in the GlobalProtect feature of Palo Alto Networks PAN-OS software for specific PAN-OS versions and distinct feature configurations may enable an unauthenticated attacker to execute arbitrary code with root privileges on the firewall. Cloud NGFW, Panorama appliances, and Prisma Access are not impacted by this vulnerability. Published: April 12, 2024; 4:15:06 AM -0400 |
V3.1: 10.0 CRITICAL V2.0:(not available) |
CVE-2024-20758 |
Adobe Commerce versions 2.4.6-p4, 2.4.5-p6, 2.4.4-p7, 2.4.7-beta3 and earlier are affected by an Improper Input Validation vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue does not require user interaction, but the attack complexity is high. Published: April 10, 2024; 8:15:08 AM -0400 |
V3.1: 9.0 CRITICAL V2.0:(not available) |
CVE-2024-29990 |
Microsoft Azure Kubernetes Service Confidential Container Elevation of Privilege Vulnerability Published: April 09, 2024; 1:16:02 PM -0400 |
V3.1: 9.0 CRITICAL V2.0:(not available) |
CVE-2023-1083 |
An unauthenticated remote attacker who is aware of a MQTT topic name can send and receive messages, including GET/SET configuration commands, reboot commands and firmware updates. Published: April 09, 2024; 5:15:19 AM -0400 |
V3.1: 9.8 CRITICAL V2.0:(not available) |
CVE-2024-21894 |
A heap overflow vulnerability in IPSec component of Ivanti Connect Secure (9.x, 22.x) and Ivanti Policy Secure allows an unauthenticated malicious user to send specially crafted requests in-order-to crash the service thereby causing a DoS attack. In certain conditions this may lead to execution of arbitrary code Published: April 04, 2024; 7:15:15 PM -0400 |
V3.1: 9.8 CRITICAL V2.0:(not available) |
CVE-2024-2692 |
SiYuan version 3.0.3 allows executing arbitrary commands on the server. This is possible because the application is vulnerable to Server Side XSS. Published: April 03, 2024; 10:15:06 PM -0400 |
V3.1: 9.6 CRITICAL V2.0:(not available) |
CVE-2024-3273 |
** UNSUPPORTED WHEN ASSIGNED ** A vulnerability, which was classified as critical, was found in D-Link DNS-320L, DNS-325, DNS-327L and DNS-340L up to 20240403. Affected is an unknown function of the file /cgi-bin/nas_sharing.cgi of the component HTTP GET Request Handler. The manipulation of the argument system leads to command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-259284. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed immediately that the product is end-of-life. It should be retired and replaced. Published: April 03, 2024; 9:15:50 PM -0400 |
V3.1: 9.8 CRITICAL V2.0:(not available) |
CVE-2024-3272 |
** UNSUPPORTED WHEN ASSIGNED ** A vulnerability, which was classified as very critical, has been found in D-Link DNS-320L, DNS-325, DNS-327L and DNS-340L up to 20240403. This issue affects some unknown processing of the file /cgi-bin/nas_sharing.cgi of the component HTTP GET Request Handler. The manipulation of the argument user with the input messagebus leads to hard-coded credentials. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-259283. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed immediately that the product is end-of-life. It should be retired and replaced. Published: April 03, 2024; 9:15:50 PM -0400 |
V3.1: 9.8 CRITICAL V2.0:(not available) |
CVE-2024-30621 |
Tenda AX1803 v1.0.0.1 contains a stack overflow via the serverName parameter in the function fromAdvSetMacMtuWan. Published: April 02, 2024; 10:15:08 AM -0400 |
V3.1: 9.8 CRITICAL V2.0:(not available) |
CVE-2024-30620 |
Tenda AX1803 v1.0.0.1 contains a stack overflow via the serviceName parameter in the function fromAdvSetMacMtuWan. Published: April 02, 2024; 10:15:08 AM -0400 |
V3.1: 9.8 CRITICAL V2.0:(not available) |
CVE-2024-21473 |
Memory corruption while redirecting log file to any file location with any file name. Published: April 01, 2024; 11:15:49 AM -0400 |
V3.1: 9.8 CRITICAL V2.0:(not available) |
CVE-2023-46808 |
An file upload vulnerability in Ivanti ITSM before 2023.4, allows an authenticated remote user to perform file writes to the server. Successful exploitation may lead to execution of commands in the context of non-root user. Published: March 30, 2024; 10:15:08 PM -0400 |
V3.1: 9.9 CRITICAL V2.0:(not available) |
CVE-2024-3094 |
Malicious code was discovered in the upstream tarballs of xz, starting with version 5.6.0. Through a series of complex obfuscations, the liblzma build process extracts a prebuilt object file from a disguised test file existing in the source code, which is then used to modify specific functions in the liblzma code. This results in a modified liblzma library that can be used by any software linked against this library, intercepting and modifying the data interaction with this library. Published: March 29, 2024; 1:15:21 PM -0400 |
V3.1: 10.0 CRITICAL V2.0:(not available) |