Common Vulnerabilities and Exposures (CVE) is a critical tool for maintaining software security, providing a standardized way to track and manage vulnerabilities across systems. Organizations should regularly monitor CVE databases, assess the impact of vulnerabilities, and apply patches promptly to reduce the risk of exploitation.
CVE (Common Vulnerabilities and Exposures) is a public database that provides a standardized method for identifying, tracking, and referencing publicly disclosed security vulnerabilities in software and hardware.
Each vulnerability receives a unique identifier called a CVE ID (e.g., CVE-2023-12345), making it easier to reference specific vulnerabilities across different tools and databases.
Total Search Results: 158437
CVE ID | Description | Severity | Published Date | Affected Vendor | Action |
---|---|---|---|---|---|
CVE-2024-21417 | Windows Text Services Framework Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2024-21418 | Software for Open Networking in the Cloud (SONiC) Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2024-21419 | Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability | Unknown | N/A | Microsoft | |
CVE-2024-2142 | The Ultimate Addons for Beaver Builder – Lite plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Info Table widget in all versions up to, and including, 1.5.7 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | Unknown | N/A | brainstormforce | |
CVE-2024-21420 | Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2024-21421 | Azure SDK Spoofing Vulnerability | Unknown | N/A | Microsoft | |
CVE-2024-21423 | Microsoft Edge (Chromium-based) Information Disclosure Vulnerability | Unknown | N/A | Microsoft | |
CVE-2024-21424 | Azure Compute Gallery Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2024-21425 | SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2024-21426 | Microsoft SharePoint Server Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2024-21427 | Windows Kerberos Security Feature Bypass Vulnerability | Unknown | N/A | Microsoft | |
CVE-2024-21428 | SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2024-21429 | Windows USB Hub Driver Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2024-2143 | The Ultimate Addons for Beaver Builder – Lite plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Heading widget in all versions up to, and including, 1.5.7 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | Unknown | N/A | brainstormforce | |
CVE-2024-21430 | Windows USB Attached SCSI (UAS) Protocol Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2024-21431 | Hypervisor-Protected Code Integrity (HVCI) Security Feature Bypass Vulnerability | Unknown | N/A | Microsoft | |
CVE-2024-21432 | Windows Update Stack Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2024-21433 | Windows Print Spooler Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2024-21434 | Microsoft Windows SCSI Class System File Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2024-21435 | Windows OLE Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2024-21436 | Windows Installer Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2024-21437 | Windows Graphics Component Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2024-21438 | Microsoft AllJoyn API Denial of Service Vulnerability | Unknown | N/A | Microsoft | |
CVE-2024-21439 | Windows Telephony Server Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2024-2144 | The Ultimate Addons for Beaver Builder – Lite plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Image Separator widget in all versions up to, and including, 1.5.7 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | Unknown | N/A | brainstormforce | |
CVE-2024-21440 | Microsoft ODBC Driver Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2024-21441 | Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2024-21442 | Windows USB Print Driver Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2024-21443 | Windows Kernel Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2024-21444 | Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2024-21445 | Windows USB Print Driver Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2024-21446 | NTFS Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2024-21447 | Windows Authentication Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2024-21448 | Microsoft Teams for Android Information Disclosure Vulnerability | Unknown | N/A | Microsoft | |
CVE-2024-21449 | SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2024-2145 | A vulnerability was found in SourceCodester Online Mobile Management Store 1.0. It has been classified as problematic. Affected is an unknown function of the file /endpoint/update-tracker.php. The manipulation of the argument firstname leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-255498 is the identifier assigned to this vulnerability. | Unknown | N/A | SourceCodester | |
CVE-2024-21450 | Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2024-21451 | Microsoft ODBC Driver Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2024-21452 | Transient DOS while decoding an ASN.1 OER message containing a SEQUENCE of unknown extensions. | Unknown | N/A | Qualcomm, Inc. | |
CVE-2024-21453 | Transient DOS while decoding message of size that exceeds the available system memory. | Unknown | N/A | Qualcomm, Inc. | |
CVE-2024-21454 | Transient DOS while decoding the ToBeSignedMessage in Automotive Telematics. | Unknown | N/A | Qualcomm, Inc. | |
CVE-2024-21455 | Memory corruption when a compat IOCTL call is followed by another IOCTL call from userspace to a driver. | Unknown | N/A | Qualcomm, Inc. | |
CVE-2024-21456 | Information Disclosure while parsing beacon frame in STA. | Unknown | N/A | Qualcomm, Inc. | |
CVE-2024-21457 | INformation disclosure while handling Multi-link IE in beacon frame. | Unknown | N/A | Qualcomm, Inc. | |
CVE-2024-21458 | Information disclosure while handling SA query action frame. | Unknown | N/A | Qualcomm, Inc. | |
CVE-2024-21459 | Information disclosure while handling beacon or probe response frame in STA. | Unknown | N/A | Qualcomm, Inc. | |
CVE-2024-2146 | A vulnerability was found in SourceCodester Online Mobile Management Store 1.0. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /?p=products. The manipulation of the argument search leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-255499. | Unknown | N/A | SourceCodester | |
CVE-2024-21460 | Information disclosure when ASLR relocates the IMEM and Secure DDR portions as one chunk in virtual address space. | Unknown | N/A | Qualcomm, Inc. | |
CVE-2024-21461 | Memory corruption while performing finish HMAC operation when context is freed by keymaster. | Unknown | N/A | Qualcomm, Inc. | |
CVE-2024-21462 | Transient DOS while loading the TA ELF file. | Unknown | N/A | Qualcomm, Inc. | |
CVE-2024-21463 | Memory corruption while processing Codec2 during v13k decoder pitch synthesis. | Unknown | N/A | Qualcomm, Inc. | |
CVE-2024-21465 | Memory corruption while processing key blob passed by the user. | Unknown | N/A | Qualcomm, Inc. | |
CVE-2024-21466 | Information disclosure while parsing sub-IE length during new IE generation. | Unknown | N/A | Qualcomm, Inc. | |
CVE-2024-21467 | Information disclosure while handling beacon probe frame during scan entry generation in client side. | Unknown | N/A | Qualcomm, Inc. | |
CVE-2024-21468 | Memory corruption when there is failed unmap operation in GPU. | Unknown | N/A | Qualcomm, Inc. | |
CVE-2024-21469 | Memory corruption when an invoke call and a TEE call are bound for the same trusted application. | Unknown | N/A | Qualcomm, Inc. | |
CVE-2024-2147 | A vulnerability was found in SourceCodester Online Mobile Management Store 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /admin/login.php. The manipulation of the argument username leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-255500. | Unknown | N/A | SourceCodester | |
CVE-2024-21470 | Memory corruption while allocating memory for graphics. | Unknown | N/A | Qualcomm, Inc. | |
CVE-2024-21471 | Memory corruption when IOMMU unmap of a GPU buffer fails in Linux. | Unknown | N/A | Qualcomm, Inc. | |
CVE-2024-21472 | Memory corruption in Kernel while handling GPU operations. | Unknown | N/A | Qualcomm, Inc. | |
CVE-2024-21473 | Memory corruption while redirecting log file to any file location with any file name. | Unknown | N/A | Qualcomm, Inc. | |
CVE-2024-21474 | Memory corruption when size of buffer from previous call is used without validation or re-initialization. | Unknown | N/A | Qualcomm, Inc. | |
CVE-2024-21475 | Memory corruption when the payload received from firmware is not as per the expected protocol size. | Unknown | N/A | Qualcomm, Inc. | |
CVE-2024-21476 | Memory corruption when the channel ID passed by user is not validated and further used. | Unknown | N/A | Qualcomm, Inc. | |
CVE-2024-21477 | Transient DOS while parsing a protected 802.11az Fine Time Measurement (FTM) frame. | Unknown | N/A | Qualcomm, Inc. | |
CVE-2024-21478 | transient DOS when setting up a fence callback to free a KGSL memory entry object during DMA. | Unknown | N/A | Qualcomm, Inc. | |
CVE-2024-21479 | Transient DOS during music playback of ALAC content. | Unknown | N/A | Qualcomm, Inc. | |
CVE-2024-2148 | A vulnerability classified as critical has been found in SourceCodester Online Mobile Management Store 1.0. This affects an unknown part of the file /classes/Users.php. The manipulation of the argument img leads to unrestricted upload. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-255501 was assigned to this vulnerability. | Unknown | N/A | SourceCodester | |
CVE-2024-21480 | Memory corruption while playing audio file having large-sized input buffer. | Unknown | N/A | Qualcomm, Inc. | |
CVE-2024-21481 | Memory corruption when preparing a shared memory notification for a memparcel in Resource Manager. | Unknown | N/A | Qualcomm, Inc. | |
CVE-2024-21482 | Memory corruption during the secure boot process, when the `bootm` command is used, it bypasses the authentication of the kernel/rootfs image. | Unknown | N/A | Qualcomm, Inc. | |
CVE-2024-21483 | A vulnerability has been identified in SENTRON 7KM PAC3120 AC/DC (7KM3120-0BA01-1DA0) (All versions >= V3.2.3 < V3.2.4 only when manufactured between LQN231003... and LQN231215... ( with LQNYYMMDD...)), SENTRON 7KM PAC3120 DC (7KM3120-1BA01-1EA0) (All versions >= V3.2.3 < V3.2.4 only when manufactured between LQN231003... and LQN231215... ( with LQNYYMMDD...)), SENTRON 7KM PAC3220 AC/DC (7KM3220-0BA01-1DA0) (All versions >= V3.2.3 < V3.2.4 only when manufactured between LQN231003... and LQN231215... ( with LQNYYMMDD...)), SENTRON 7KM PAC3220 DC (7KM3220-1BA01-1EA0) (All versions >= V3.2.3 < V3.2.4 only when manufactured between LQN231003... and LQN231215... ( with LQNYYMMDD...)). The read out protection of the internal flash of affected devices was not properly set at the end of the manufacturing process. An attacker with physical access to the device could read out the data. | Unknown | N/A | Siemens | |
CVE-2024-21484 | Versions of the package jsrsasign before 11.0.0 are vulnerable to Observable Discrepancy via the RSA PKCS1.5 or RSAOAEP decryption process. An attacker can decrypt ciphertexts by exploiting the Marvin security flaw. Exploiting this vulnerability requires the attacker to have access to a large number of ciphertexts encrypted with the same key. Workaround The vulnerability can be mitigated by finding and replacing RSA and RSAOAEP decryption with another crypto library. | Unknown | N/A | n/a | |
CVE-2024-21485 | Versions of the package dash-core-components before 2.13.0; versions of the package dash-core-components before 2.0.0; versions of the package dash before 2.15.0; versions of the package dash-html-components before 2.0.0; versions of the package dash-html-components before 2.0.16 are vulnerable to Cross-site Scripting (XSS) when the href of the a tag is controlled by an adversary. An authenticated attacker who stores a view that exploits this vulnerability could steal the data that's visible to another user who opens that view - not just the data already included on the page, but they could also, in theory, make additional requests and access other data accessible to this user. In some cases, they could also steal the access tokens of that user, which would allow the attacker to act as that user, including viewing other apps and resources hosted on the same server. **Note:** This is only exploitable in Dash apps that include some mechanism to store user input to be reloaded by a different user. | Unknown | N/A | n/a | |
CVE-2024-21488 | Versions of the package network before 0.7.0 are vulnerable to Arbitrary Command Injection due to use of the child_process exec function without input sanitization. If (attacker-controlled) user input is given to the mac_address_for function of the package, it is possible for the attacker to execute arbitrary commands on the operating system that this package is being run on. | Unknown | N/A | n/a | |
CVE-2024-21489 | Versions of the package uplot before 1.6.31 are vulnerable to Prototype Pollution via the uplot.assign function due to missing check if the attribute resolves to the object prototype. | Unknown | N/A | n/a | |
CVE-2024-2149 | A vulnerability classified as critical was found in CodeAstro Membership Management System 1.0. This vulnerability affects unknown code of the file settings.php. The manipulation of the argument currency leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-255502 is the identifier assigned to this vulnerability. | Unknown | N/A | CodeAstro | |
CVE-2024-21490 | This affects versions of the package angular from 1.3.0. A regular expression used to split the value of the ng-srcset directive is vulnerable to super-linear runtime due to backtracking. With large carefully-crafted input, this can result in catastrophic backtracking and cause a denial of service. **Note:** This package is EOL and will not receive any updates to address this issue. Users should migrate to [@angular/core](https://www.npmjs.com/package/@angular/core). | Unknown | N/A | n/a | |
CVE-2024-21491 | Versions of the package svix before 1.17.0 are vulnerable to Authentication Bypass due to an issue in the verify function where signatures of different lengths are incorrectly compared. An attacker can bypass signature verification by providing a shorter signature that matches the beginning of the actual signature. **Note:** The attacker would need to know a victim uses the Rust library for verification,no easy way to automatically check that; and uses webhooks by a service that uses Svix, and then figure out a way to craft a malicious payload that will actually include all of the correct identifiers needed to trick the receivers to cause actual issues. | Unknown | N/A | n/a | |
CVE-2024-21492 | All versions of the package github.com/greenpau/caddy-security are vulnerable to Insufficient Session Expiration due to improper user session invalidation upon clicking the "Sign Out" button. User sessions remain valid even after requests are sent to /logout and /oauth2/google/logout. Attackers who gain access to an active but supposedly logged-out session can perform unauthorized actions on behalf of the user. | Unknown | N/A | n/a | |
CVE-2024-21493 | All versions of the package github.com/greenpau/caddy-security are vulnerable to Improper Validation of Array Index when parsing a Caddyfile. Multiple parsing functions in the affected library do not validate whether their input values are nil before attempting to access elements, which can lead to a panic (index out of range). Panics during the parsing of a configuration file may introduce ambiguity and vulnerabilities, hindering the correct interpretation and configuration of the web server. | Unknown | N/A | n/a | |
CVE-2024-21494 | All versions of the package github.com/greenpau/caddy-security are vulnerable to Authentication Bypass by Spoofing via the X-Forwarded-For header due to improper input sanitization. An attacker can spoof an IP address used in the user identity module (/whoami API endpoint). This could lead to unauthorized access if the system trusts this spoofed IP address. | Unknown | N/A | n/a | |
CVE-2024-21495 | Versions of the package github.com/greenpau/caddy-security before 1.0.42 are vulnerable to Insecure Randomness due to using an insecure random number generation library which could possibly be predicted via a brute-force search. Attackers could use the potentially predictable nonce value used for authentication purposes in the OAuth flow to conduct OAuth replay attacks. In addition, insecure randomness is used while generating multifactor authentication (MFA) secrets and creating API keys in the database package. | Unknown | N/A | n/a | |
CVE-2024-21496 | All versions of the package github.com/greenpau/caddy-security are vulnerable to Cross-site Scripting (XSS) via the Referer header, due to improper input sanitization. Although the Referer header is sanitized by escaping some characters that can allow XSS (e.g., [&], [<], [>], ["], [']), it does not account for the attack based on the JavaScript URL scheme (e.g., javascript:alert(document.domain)// payload). Exploiting this vulnerability may not be trivial, but it could lead to the execution of malicious scripts in the context of the target user’s browser, compromising user sessions. | Unknown | N/A | n/a | |
CVE-2024-21497 | All versions of the package github.com/greenpau/caddy-security are vulnerable to Open Redirect via the redirect_url parameter. An attacker could perform a phishing attack and trick users into visiting a malicious website by crafting a convincing URL with this parameter. To exploit this vulnerability, the user must take an action, such as clicking on a portal button or using the browser’s back button, to trigger the redirection. | Unknown | N/A | n/a | |
CVE-2024-21498 | All versions of the package github.com/greenpau/caddy-security are vulnerable to Server-side Request Forgery (SSRF) via X-Forwarded-Host header manipulation. An attacker can expose sensitive information, interact with internal services, or exploit other vulnerabilities within the network by exploiting this vulnerability. | Unknown | N/A | n/a | |
CVE-2024-21499 | All versions of the package github.com/greenpau/caddy-security are vulnerable to HTTP Header Injection via the X-Forwarded-Proto header due to redirecting to the injected protocol.Exploiting this vulnerability could lead to bypass of security mechanisms or confusion in handling TLS. | Unknown | N/A | n/a | |
CVE-2024-2150 | A vulnerability, which was classified as critical, has been found in SourceCodester Insurance Management System 1.0. This issue affects some unknown processing. The manipulation of the argument page leads to file inclusion. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-255503. | Unknown | N/A | SourceCodester | |
CVE-2024-21500 | All versions of the package github.com/greenpau/caddy-security are vulnerable to Improper Restriction of Excessive Authentication Attempts via the two-factor authentication (2FA). Although the application blocks the user after several failed attempts to provide 2FA codes, attackers can bypass this blocking mechanism by automating the application’s full multistep 2FA process. | Unknown | N/A | n/a | |
CVE-2024-21501 | Versions of the package sanitize-html before 2.12.1 are vulnerable to Information Exposure when used on the backend and with the style attribute allowed, allowing enumeration of files in the system (including project dependencies). An attacker could exploit this vulnerability to gather details about the file system structure and dependencies of the targeted server. | Unknown | N/A | n/a | |
CVE-2024-21502 | Versions of the package fastecdsa before 2.3.2 are vulnerable to Use of Uninitialized Variable on the stack, via the curvemath_mul function in src/curveMath.c, due to being used and interpreted as user-defined type. Depending on the variable's actual value it could be arbitrary free(), arbitrary realloc(), null pointer dereference and other. Since the stack can be controlled by the attacker, the vulnerability could be used to corrupt allocator structure, leading to possible heap exploitation. The attacker could cause denial of service by exploiting this vulnerability. | Unknown | N/A | n/a | |
CVE-2024-21503 | Versions of the package black before 24.3.0 are vulnerable to Regular Expression Denial of Service (ReDoS) via the lines_with_leading_tabs_expanded function in the strings.py file. An attacker could exploit this vulnerability by crafting a malicious input that causes a denial of service. Exploiting this vulnerability is possible when running Black on untrusted input, or if you habitually put thousands of leading tab characters in your docstrings. | Unknown | N/A | n/a | |
CVE-2024-21504 | Versions of the package livewire/livewire from 3.3.5 and before 3.4.9 are vulnerable to Cross-site Scripting (XSS) when a page uses [Url] for a property. An attacker can inject HTML code in the context of the user's browser session by crafting a malicious link and convincing the user to click on it. | Unknown | N/A | n/a | |
CVE-2024-21505 | Versions of the package web3-utils before 4.2.1 are vulnerable to Prototype Pollution via the utility functions format and mergeDeep, due to insecure recursive merge. An attacker can manipulate an object's prototype, potentially leading to the alteration of the behavior of all objects inheriting from the affected prototype by passing specially crafted input to these functions. | Unknown | N/A | n/a | |
CVE-2024-21507 | Versions of the package mysql2 before 3.9.3 are vulnerable to Improper Input Validation through the keyFromFields function, resulting in cache poisoning. An attacker can inject a colon (:) character within a value of the attacker-crafted key. | Unknown | N/A | n/a | |
CVE-2024-21508 | Versions of the package mysql2 before 3.9.4 are vulnerable to Remote Code Execution (RCE) via the readCodeFor function due to improper validation of the supportBigNumbers and bigNumberStrings values. | Unknown | N/A | n/a | |
CVE-2024-21509 | Versions of the package mysql2 before 3.9.4 are vulnerable to Prototype Poisoning due to insecure results object creation and improper user input sanitization passed through parserFn in text_parser.js and binary_parser.js. | Unknown | N/A | n/a | |
CVE-2024-2151 | A vulnerability classified as problematic was found in SourceCodester Online Mobile Management Store 1.0. Affected by this vulnerability is an unknown functionality of the component Product Price Handler. The manipulation of the argument quantity with the input -1 leads to business logic errors. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-255583. | Unknown | N/A | SourceCodester | |
CVE-2024-21511 | Versions of the package mysql2 before 3.9.7 are vulnerable to Arbitrary Code Injection due to improper sanitization of the timezone parameter in the readCodeFor function by calling a native MySQL Server date/time function. | Unknown | N/A | n/a | |
CVE-2024-21512 | Versions of the package mysql2 before 3.9.8 are vulnerable to Prototype Pollution due to improper user input sanitization passed to fields and tables when using nestTables. | Unknown | N/A | n/a |
vunerability-insight.com © 2023 - 2025. All Rights Reserved.
Vulnerability Data Repositories v