U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Results (Refine Search)

Search Parameters:
  • Search Type: Search Last 3 Months
There are 14,156 matching records.
Displaying matches 8,001 through 8,020.
Vuln ID Summary CVSS Severity
CVE-2024-30003

Windows Mobile Broadband Driver Remote Code Execution Vulnerability

Published: May 14, 2024; 1:16:31 PM -0400
V4.0:(not available)
V3.1: 6.8 MEDIUM
V2.0:(not available)
CVE-2024-30002

Windows Mobile Broadband Driver Remote Code Execution Vulnerability

Published: May 14, 2024; 1:16:29 PM -0400
V4.0:(not available)
V3.1: 6.8 MEDIUM
V2.0:(not available)
CVE-2024-30001

Windows Mobile Broadband Driver Remote Code Execution Vulnerability

Published: May 14, 2024; 1:16:28 PM -0400
V4.0:(not available)
V3.1: 6.8 MEDIUM
V2.0:(not available)
CVE-2024-30000

Windows Mobile Broadband Driver Remote Code Execution Vulnerability

Published: May 14, 2024; 1:16:26 PM -0400
V4.0:(not available)
V3.1: 6.8 MEDIUM
V2.0:(not available)
CVE-2024-29999

Windows Mobile Broadband Driver Remote Code Execution Vulnerability

Published: May 14, 2024; 1:16:25 PM -0400
V4.0:(not available)
V3.1: 6.8 MEDIUM
V2.0:(not available)
CVE-2024-29998

Windows Mobile Broadband Driver Remote Code Execution Vulnerability

Published: May 14, 2024; 1:16:23 PM -0400
V4.0:(not available)
V3.1: 6.8 MEDIUM
V2.0:(not available)
CVE-2024-29997

Windows Mobile Broadband Driver Remote Code Execution Vulnerability

Published: May 14, 2024; 1:16:21 PM -0400
V4.0:(not available)
V3.1: 6.8 MEDIUM
V2.0:(not available)
CVE-2024-29996

Windows Common Log File System Driver Elevation of Privilege Vulnerability

Published: May 14, 2024; 1:16:19 PM -0400
V4.0:(not available)
V3.1: 7.8 HIGH
V2.0:(not available)
CVE-2024-29994

Microsoft Windows SCSI Class System File Elevation of Privilege Vulnerability

Published: May 14, 2024; 1:16:17 PM -0400
V4.0:(not available)
V3.1: 7.8 HIGH
V2.0:(not available)
CVE-2024-27109

Insufficiently protected credentials in GE HealthCare EchoPAC products

Published: May 14, 2024; 1:15:58 PM -0400
V4.0:(not available)
V3.x:(not available)
V2.0:(not available)
CVE-2024-27108

Non privileged access to critical file vulnerability in GE HealthCare EchoPAC products

Published: May 14, 2024; 1:15:57 PM -0400
V4.0:(not available)
V3.x:(not available)
V2.0:(not available)
CVE-2024-27107

Weak account password in GE HealthCare EchoPAC products

Published: May 14, 2024; 1:15:56 PM -0400
V4.0:(not available)
V3.x:(not available)
V2.0:(not available)
CVE-2024-27106

Vulnerable data in transit in GE HealthCare EchoPAC products

Published: May 14, 2024; 1:15:54 PM -0400
V4.0:(not available)
V3.x:(not available)
V2.0:(not available)
CVE-2024-26238

Microsoft PLUGScheduler Scheduled Task Elevation of Privilege Vulnerability

Published: May 14, 2024; 1:15:50 PM -0400
V4.0:(not available)
V3.1: 7.8 HIGH
V2.0:(not available)
CVE-2024-26007

An improper check or handling of exceptional conditions vulnerability [CWE-703] in Fortinet FortiOS version 7.4.1 allows an unauthenticated attacker to provoke a denial of service on the administrative interface via crafted HTTP requests.

Published: May 14, 2024; 1:15:40 PM -0400
V4.0:(not available)
V3.x:(not available)
V2.0:(not available)
CVE-2024-23105

A Use Of Less Trusted Source [CWE-348] vulnerability in Fortinet FortiPortal version 7.0.0 through 7.0.6 and version 7.2.0 through 7.2.1 allows an unauthenticated attack to bypass IP protection through crafted HTTP or HTTPS packets.

Published: May 14, 2024; 1:15:38 PM -0400
V4.0:(not available)
V3.1: 7.5 HIGH
V2.0:(not available)
CVE-2024-1630

Path traversal vulnerability in “getAllFolderContents” function of Common Service Desktop, a GE HealthCare ultrasound device component

Published: May 14, 2024; 1:15:31 PM -0400
V4.0:(not available)
V3.x:(not available)
V2.0:(not available)
CVE-2024-1629

Path traversal vulnerability in “deleteFiles” function of Common Service Desktop, a GE HealthCare ultrasound device component

Published: May 14, 2024; 1:15:29 PM -0400
V4.0:(not available)
V3.x:(not available)
V2.0:(not available)
CVE-2023-50180

An exposure of sensitive system information to an unauthorized control sphere vulnerability [CWE-497] in FortiADC version 7.4.1 and below, version 7.2.3 and below, version 7.1.4 and below, version 7.0.5 and below, version 6.2.6 and below may allow a read-only admin to view data pertaining to other admins.

Published: May 14, 2024; 1:15:27 PM -0400
V4.0:(not available)
V3.1: 5.5 MEDIUM
V2.0:(not available)
CVE-2023-46714

A stack-based buffer overflow [CWE-121] vulnerability in Fortinet FortiOS version 7.2.1 through 7.2.6 and version 7.4.0 through 7.4.1 allows a privileged attacker over the administrative interface to execute arbitrary code or commands via crafted HTTP or HTTPs requests.

Published: May 14, 2024; 1:15:25 PM -0400
V4.0:(not available)
V3.1: 7.2 HIGH
V2.0:(not available)