Common Vulnerabilities and Exposures (CVE) is a critical tool for maintaining software security, providing a standardized way to track and manage vulnerabilities across systems. Organizations should regularly monitor CVE databases, assess the impact of vulnerabilities, and apply patches promptly to reduce the risk of exploitation.
CVE (Common Vulnerabilities and Exposures) is a public database that provides a standardized method for identifying, tracking, and referencing publicly disclosed security vulnerabilities in software and hardware.
Each vulnerability receives a unique identifier called a CVE ID (e.g., CVE-2023-12345), making it easier to reference specific vulnerabilities across different tools and databases.
Total Search Results: 158437
CVE ID | Description | Severity | Published Date | Affected Vendor | Action |
---|---|---|---|---|---|
CVE-2024-26207 | Windows Remote Access Connection Manager Information Disclosure Vulnerability | Unknown | N/A | Microsoft | |
CVE-2024-26208 | Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2024-26209 | Microsoft Local Security Authority Subsystem Service Information Disclosure Vulnerability | Unknown | N/A | Microsoft | |
CVE-2024-2621 | A vulnerability was found in Fujian Kelixin Communication Command and Dispatch Platform up to 20240318 and classified as critical. Affected by this issue is some unknown functionality of the file api/client/user/pwd_update.php. The manipulation of the argument uuid leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-257198 is the identifier assigned to this vulnerability. | Unknown | N/A | Fujian Kelixin Communication | |
CVE-2024-26210 | Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2024-26211 | Windows Remote Access Connection Manager Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2024-26212 | DHCP Server Service Denial of Service Vulnerability | Unknown | N/A | Microsoft | |
CVE-2024-26213 | Microsoft Brokering File System Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2024-26214 | Microsoft WDAC SQL Server ODBC Driver Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2024-26215 | DHCP Server Service Denial of Service Vulnerability | Unknown | N/A | Microsoft | |
CVE-2024-26216 | Windows File Server Resource Management Service Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2024-26217 | Windows Remote Access Connection Manager Information Disclosure Vulnerability | Unknown | N/A | Microsoft | |
CVE-2024-26218 | Windows Kernel Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2024-26219 | HTTP.sys Denial of Service Vulnerability | Unknown | N/A | Microsoft | |
CVE-2024-2622 | A vulnerability was found in Fujian Kelixin Communication Command and Dispatch Platform up to 20240318. It has been classified as critical. This affects an unknown part of the file /api/client/editemedia.php. The manipulation of the argument number/enterprise_uuid leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-257199. | Unknown | N/A | Fujian Kelixin Communication | |
CVE-2024-26220 | Windows Mobile Hotspot Information Disclosure Vulnerability | Unknown | N/A | Microsoft | |
CVE-2024-26221 | Windows DNS Server Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2024-26222 | Windows DNS Server Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2024-26223 | Windows DNS Server Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2024-26224 | Windows DNS Server Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2024-26226 | Windows Distributed File System (DFS) Information Disclosure Vulnerability | Unknown | N/A | Microsoft | |
CVE-2024-26227 | Windows DNS Server Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2024-26228 | Windows Cryptographic Services Security Feature Bypass Vulnerability | Unknown | N/A | Microsoft | |
CVE-2024-26229 | Windows CSC Service Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2024-2623 | The Essential Addons for Elementor – Best Elementor Templates, Widgets, Kits & WooCommerce Builders plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the countdown widget's message parameter in all versions up to, and including, 5.9.11 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor access or higher, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | Unknown | N/A | wpdevteam | |
CVE-2024-26230 | Windows Telephony Server Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2024-26231 | Windows DNS Server Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2024-26232 | Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2024-26233 | Windows DNS Server Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2024-26234 | Proxy Driver Spoofing Vulnerability | Unknown | N/A | Microsoft | |
CVE-2024-26235 | Windows Update Stack Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2024-26236 | Windows Update Stack Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2024-26237 | Windows Defender Credential Guard Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2024-26238 | Microsoft PLUGScheduler Scheduled Task Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2024-26239 | Windows Telephony Server Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2024-2624 | A path traversal and arbitrary file upload vulnerability exists in the parisneo/lollms-webui application, specifically within the `@router.get("/switch_personal_path")` endpoint in `./lollms-webui/lollms_core/lollms/server/endpoints/lollms_user.py`. The vulnerability arises due to insufficient sanitization of user-supplied input for the `path` parameter, allowing an attacker to specify arbitrary file system paths. This flaw enables direct arbitrary file uploads, leakage of `personal_data`, and overwriting of configurations in `lollms-webui`->`configs` by exploiting the same named directory in `personal_data`. The issue affects the latest version of the application and is fixed in version 9.4. Successful exploitation could lead to sensitive information disclosure, unauthorized file uploads, and potentially remote code execution by overwriting critical configuration files. | Unknown | N/A | parisneo | |
CVE-2024-26240 | Secure Boot Security Feature Bypass Vulnerability | Unknown | N/A | Microsoft | |
CVE-2024-26241 | Win32k Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2024-26242 | Windows Telephony Server Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2024-26243 | Windows USB Print Driver Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2024-26244 | Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2024-26245 | Windows SMB Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2024-26246 | Microsoft Edge (Chromium-based) Security Feature Bypass Vulnerability | Unknown | N/A | Microsoft | |
CVE-2024-26247 | Microsoft Edge (Chromium-based) Security Feature Bypass Vulnerability | Unknown | N/A | Microsoft | |
CVE-2024-26248 | Windows Kerberos Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2024-2625 | Object lifecycle issue in V8 in Google Chrome prior to 123.0.6312.58 allowed a remote attacker to potentially exploit object corruption via a crafted HTML page. (Chromium security severity: High) | Unknown | N/A | ||
CVE-2024-26250 | Secure Boot Security Feature Bypass Vulnerability | Unknown | N/A | Microsoft | |
CVE-2024-26251 | Microsoft SharePoint Server Spoofing Vulnerability | Unknown | N/A | Microsoft | |
CVE-2024-26252 | Windows rndismp6.sys Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2024-26253 | Windows rndismp6.sys Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2024-26254 | Microsoft Virtual Machine Bus (VMBus) Denial of Service Vulnerability | Unknown | N/A | Microsoft | |
CVE-2024-26255 | Windows Remote Access Connection Manager Information Disclosure Vulnerability | Unknown | N/A | Microsoft | |
CVE-2024-26256 | Libarchive Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2024-26257 | Microsoft Excel Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2024-26258 | OS command injection vulnerability in ELECOM wireless LAN routers allows a network-adjacent attacker with credentials to execute arbitrary OS commands by sending a specially crafted request to the product. | Unknown | N/A | ELECOM CO.,LTD. | |
CVE-2024-2626 | Out of bounds read in Swiftshader in Google Chrome prior to 123.0.6312.58 allowed a remote attacker to perform out of bounds memory access via a crafted HTML page. (Chromium security severity: Medium) | Unknown | N/A | ||
CVE-2024-26260 | The functionality for synchronization in HGiga OAKlouds' certain moudules has an OS Command Injection vulnerability, allowing remote attackers to inject system commands within specific request parameters. This enables the execution of arbitrary code on the remote server without permission. | Unknown | N/A | Hgiga | |
CVE-2024-26261 | The functionality for file download in HGiga OAKlouds' certain modules contains an Arbitrary File Read and Delete vulnerability. Attackers can put file path in specific request parameters, allowing them to download the file without login. Furthermore, the file will be deleted after being downloaded. | Unknown | N/A | Hgiga | |
CVE-2024-26262 | EBM Technologies Uniweb/SoliPACS WebServer's query functionality lacks proper restrictions of user input, allowing remote attackers authenticated as regular user to inject SQL commands for reading, modifying, and deleting database records, as well as executing system commands. Attackers may even leverage the dbo privilege in the database for privilege escalation, elevating their privileges to administrator . | Unknown | N/A | EBM Technologies | |
CVE-2024-26263 | EBM Technologies RISWEB's specific URL path is not properly controlled by permission, allowing attackers to browse specific pages and query sensitive data without login. | Unknown | N/A | EBM Technologies | |
CVE-2024-26264 | EBM Technologies RISWEB's specific query function parameter does not properly restrict user input, and this feature page is accessible without login. This allows remote attackers to inject SQL commands without authentication, enabling them to read, modify, and delete database records. | Unknown | N/A | EBM Technologies | |
CVE-2024-26265 | The Image Uploader module in Liferay Portal 7.2.0 through 7.4.3.15, and older unsupported versions, and Liferay DXP 7.4 before update 16, 7.3 before update 4, 7.2 before fix pack 19, and older unsupported versions relies on a request parameter to limit the size of files that can be uploaded, which allows remote authenticated users to upload arbitrarily large files to the system's temp folder by modifying the `maxFileSize` parameter. | Unknown | N/A | Liferay | |
CVE-2024-26266 | Multiple stored cross-site scripting (XSS) vulnerabilities in Liferay Portal 7.2.0 through 7.4.3.13, and older unsupported versions, and Liferay DXP 7.4 before update 10, 7.3 before update 4, 7.2 before fix pack 17, and older unsupported versions allow remote authenticated users to inject arbitrary web script or HTML via a crafted payload injected into the first/middle/last name text field of the user who creates an entry in the (1) Announcement widget, or (2) Alerts widget. | Unknown | N/A | Liferay | |
CVE-2024-26267 | In Liferay Portal 7.2.0 through 7.4.3.25, and older unsupported versions, and Liferay DXP 7.4 before update 26, 7.3 before update 5, 7.2 before fix pack 19, and older unsupported versions the default value of the portal property `http.header.version.verbosity` is set to `full`, which allows remote attackers to easily identify the version of the application that is running and the vulnerabilities that affect that version via 'Liferay-Portal` response header. | Unknown | N/A | Liferay | |
CVE-2024-26268 | User enumeration vulnerability in Liferay Portal 7.2.0 through 7.4.3.26, and older unsupported versions, and Liferay DXP 7.4 before update 27, 7.3 before update 8, 7.2 before fix pack 20, and older unsupported versions allows remote attackers to determine if an account exist in the application by comparing the request's response time. | Unknown | N/A | Liferay | |
CVE-2024-26269 | Cross-site scripting (XSS) vulnerability in the Frontend JS module's portlet.js in Liferay Portal 7.2.0 through 7.4.3.37, and Liferay DXP 7.4 before update 38, 7.3 before update 11, 7.2 before fix pack 20, and older unsupported versions allows remote attackers to inject arbitrary web script or HTML via the anchor (hash) part of a URL. | Unknown | N/A | Liferay | |
CVE-2024-2627 | Use after free in Canvas in Google Chrome prior to 123.0.6312.58 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium) | Unknown | N/A | ||
CVE-2024-26270 | The Account Settings page in Liferay Portal 7.4.3.76 through 7.4.3.99, and Liferay DXP 2023.Q3 before patch 5, and 7.4 update 76 through 92 embeds the user’s hashed password in the page’s HTML source, which allows man-in-the-middle attackers to steal a user's hashed password. | Unknown | N/A | Liferay | |
CVE-2024-26271 | Cross-site request forgery (CSRF) vulnerability in the My Account widget in Liferay Portal 7.4.3.75 through 7.4.3.111, and Liferay DXP 2023.Q4.0 through 2023.Q4.2, 2023.Q3.1 through 2023.Q3.5, 7.4 update 75 through update 92 and 7.3 update 32 through update 36 allows remote attackers to (1) change user passwords, (2) shut down the server, (3) execute arbitrary code in the scripting console, (4) and perform other administrative actions via the _com_liferay_my_account_web_portlet_MyAccountPortlet_backURL parameter. | Unknown | N/A | Liferay | |
CVE-2024-26272 | Cross-site request forgery (CSRF) vulnerability in the content page editor in Liferay Portal 7.3.2 through 7.4.3.107, and Liferay DXP 2023.Q4.0 through 2023.Q4.2, 2023.Q3.1 through 2023.Q3.5, 7.4 GA through update 92 and 7.3 GA through update 35 allows remote attackers to (1) change user passwords, (2) shut down the server, (3) execute arbitrary code in the scripting console, (4) and perform other administrative actions via the p_l_back_url parameter. | Unknown | N/A | Liferay | |
CVE-2024-26273 | Cross-site request forgery (CSRF) vulnerability in the content page editor in Liferay Portal 7.4.0 through 7.4.3.103, and Liferay DXP 2023.Q4.0 through 2023.Q4.2, 2023.Q3.1 through 2023.Q3.5, 7.4 GA through update 92 and 7.3 update 29 through update 35 allows remote attackers to (1) change user passwords, (2) shut down the server, (3) execute arbitrary code in the scripting console, (4) and perform other administrative actions via the _com_liferay_commerce_catalog_web_internal_portlet_CommerceCatalogsPortlet_redirect parameter. | Unknown | N/A | Liferay | |
CVE-2024-26275 | A vulnerability has been identified in JT2Go (All versions < V2312.0004), Parasolid V35.1 (All versions < V35.1.254), Parasolid V36.0 (All versions < V36.0.207), Parasolid V36.1 (All versions < V36.1.147), Teamcenter Visualization V14.2 (All versions < V14.2.0.12), Teamcenter Visualization V14.3 (All versions < V14.3.0.9), Teamcenter Visualization V2312 (All versions < V2312.0004). The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted X_T files. This could allow an attacker to execute code in the context of the current process. | Unknown | N/A | Siemens | |
CVE-2024-26276 | A vulnerability has been identified in JT2Go (All versions < V2312.0004), Parasolid V35.1 (All versions < V35.1.254), Parasolid V36.0 (All versions < V36.0.207), Parasolid V36.1 (All versions < V36.1.147), Teamcenter Visualization V14.2 (All versions < V14.2.0.12), Teamcenter Visualization V14.3 (All versions < V14.3.0.9), Teamcenter Visualization V2312 (All versions < V2312.0004). The affected application contains a stack exhaustion vulnerability while parsing a specially crafted X_T file. This could allow an attacker to cause denial of service condition. | Unknown | N/A | Siemens | |
CVE-2024-26277 | A vulnerability has been identified in JT2Go (All versions < V2312.0004), Parasolid V35.1 (All versions < V35.1.254), Parasolid V36.0 (All versions < V36.0.207), Parasolid V36.1 (All versions < V36.1.147), Teamcenter Visualization V14.2 (All versions < V14.2.0.12), Teamcenter Visualization V14.3 (All versions < V14.3.0.9), Teamcenter Visualization V2312 (All versions < V2312.0004). The affected applications contain a null pointer dereference vulnerability while parsing specially crafted X_T files. An attacker could leverage this vulnerability to crash the application causing denial of service condition. | Unknown | N/A | Siemens | |
CVE-2024-26278 | The Custom Fields component not correctly filter inputs, leading to a XSS vector. | Unknown | N/A | Joomla! Project | |
CVE-2024-26279 | The wrapper extensions do not correctly validate inputs, leading to XSS vectors. | Unknown | N/A | Joomla! Project | |
CVE-2024-2628 | Inappropriate implementation in Downloads in Google Chrome prior to 123.0.6312.58 allowed a remote attacker to perform UI spoofing via a crafted URL. (Chromium security severity: Medium) | Unknown | N/A | ||
CVE-2024-26280 | Apache Airflow, versions before 2.8.2, has a vulnerability that allows authenticated Ops and Viewers users to view all information on audit logs, including dag names and usernames they were not permitted to view. With 2.8.2 and newer, Ops and Viewer users do not have audit log permission by default, they need to be explicitly granted permissions to see the logs. Only admin users have audit log permission by default. Users of Apache Airflow are recommended to upgrade to version 2.8.2 or newer to mitigate the risk associated with this vulnerability | Unknown | N/A | Apache Software Foundation | |
CVE-2024-26281 | Upon scanning a JavaScript URI with the QR code scanner, an attacker could have executed unauthorized scripts on the current top origin sites in the URL bar. This vulnerability affects Firefox for iOS < 123. | Unknown | N/A | Mozilla | |
CVE-2024-26282 | Using an AMP url with a canonical element, an attacker could have executed JavaScript from an opened bookmarked page. This vulnerability affects Firefox for iOS < 123. | Unknown | N/A | Mozilla | |
CVE-2024-26283 | An attacker could have executed unauthorized scripts on top origin sites using a JavaScript URI when opening an external URL with a custom Firefox scheme. This vulnerability affects Firefox for iOS < 123. | Unknown | N/A | Mozilla | |
CVE-2024-26284 | Utilizing a 302 redirect, an attacker could have conducted a Universal Cross-Site Scripting (UXSS) on a victim website, if the victim had a link to the attacker's website. This vulnerability affects Focus for iOS < 123. | Unknown | N/A | Mozilla | |
CVE-2024-26288 | An unauthenticated remote attacker can influence the communication due to the lack of encryption of sensitive data via a MITM. Charging is not affected. | Unknown | N/A | PHOENIX CONTACT | |
CVE-2024-26289 | Deserialization of Untrusted Data vulnerability in PMB Services PMB allows Remote Code Inclusion.This issue affects PMB: from 7.5.1 before 7.5.6-2, from 7.4.1 before 7.4.9, from 7.3.1 before 7.3.18. | Unknown | N/A | PMB Services | |
CVE-2024-2629 | Incorrect security UI in iOS in Google Chrome prior to 123.0.6312.58 allowed a remote attacker to perform UI spoofing via a crafted HTML page. (Chromium security severity: Medium) | Unknown | N/A | ||
CVE-2024-26294 | Vulnerabilities in the ClearPass Policy Manager web-based management interface allow remote authenticated users to run arbitrary commands on the underlying host. A successful exploit could allow an attacker to execute arbitrary commands as root on the underlying operating system leading to complete system compromise. | Unknown | N/A | Hewlett Packard Enterprise (HPE) | |
CVE-2024-26295 | Vulnerabilities in the ClearPass Policy Manager web-based management interface allow remote authenticated users to run arbitrary commands on the underlying host. A successful exploit could allow an attacker to execute arbitrary commands as root on the underlying operating system leading to complete system compromise. | Unknown | N/A | Hewlett Packard Enterprise (HPE) | |
CVE-2024-26296 | Vulnerabilities in the ClearPass Policy Manager web-based management interface allow remote authenticated users to run arbitrary commands on the underlying host. A successful exploit could allow an attacker to execute arbitrary commands as root on the underlying operating system leading to complete system compromise. | Unknown | N/A | Hewlett Packard Enterprise (HPE) | |
CVE-2024-26297 | Vulnerabilities in the ClearPass Policy Manager web-based management interface allow remote authenticated users to run arbitrary commands on the underlying host. A successful exploit could allow an attacker to execute arbitrary commands as root on the underlying operating system leading to complete system compromise. | Unknown | N/A | Hewlett Packard Enterprise (HPE) | |
CVE-2024-26298 | Vulnerabilities in the ClearPass Policy Manager web-based management interface allow remote authenticated users to run arbitrary commands on the underlying host. A successful exploit could allow an attacker to execute arbitrary commands as root on the underlying operating system leading to complete system compromise. | Unknown | N/A | Hewlett Packard Enterprise (HPE) | |
CVE-2024-26299 | A vulnerability in the web-based management interface of ClearPass Policy Manager could allow an authenticated remote attacker to conduct a stored cross-site scripting (XSS) attack against an administrative user of the interface. A successful exploit allows an attacker to execute arbitrary script code in a victim's browser in the context of the affected interface. | Unknown | N/A | Hewlett Packard Enterprise (HPE) | |
CVE-2024-2630 | Inappropriate implementation in iOS in Google Chrome prior to 123.0.6312.58 allowed a remote attacker to leak cross-origin data via a crafted HTML page. (Chromium security severity: Medium) | Unknown | N/A | ||
CVE-2024-26300 | A vulnerability in the guest interface of ClearPass Policy Manager could allow an authenticated remote attacker to conduct a stored cross-site scripting (XSS) attack against an administrative user of the interface. A successful exploit allows an attacker to execute arbitrary script code in a victim's browser in the context of the affected interface. | Unknown | N/A | Hewlett Packard Enterprise (HPE) | |
CVE-2024-26301 | A vulnerability in the web-based management interface of ClearPass Policy Manager could allow a remote attacker authenticated with low privileges to access sensitive information. A successful exploit allows an attacker to retrieve information which could be used to potentially gain further access to network services supported by ClearPass Policy Manager. | Unknown | N/A | Hewlett Packard Enterprise (HPE) | |
CVE-2024-26302 | A vulnerability in the web-based management interface of ClearPass Policy Manager could allow a remote attacker authenticated with low privileges to access sensitive information. A successful exploit allows an attacker to retrieve information which could be used to potentially gain further access to network services supported by ClearPass Policy Manager. | Unknown | N/A | Hewlett Packard Enterprise (HPE) | |
CVE-2024-26303 | Authenticated Denial of Service Vulnerability in ArubaOS-Switch SSH Daemon | Unknown | N/A | Hewlett Packard Enterprise (HPE) | |
CVE-2024-26304 | There is a buffer overflow vulnerability in the underlying L2/L3 Management service that could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba's access point management protocol) UDP port (8211). Successful exploitation of this vulnerability results in the ability to execute arbitrary code as a privileged user on the underlying operating system. | Unknown | N/A | Hewlett Packard Enterprise (HPE) | |
CVE-2024-26305 | There is a buffer overflow vulnerability in the underlying Utility daemon that could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba's access point management protocol) UDP port (8211). Successful exploitation of this vulnerability results in the ability to execute arbitrary code as a privileged user on the underlying operating system. | Unknown | N/A | Hewlett Packard Enterprise (HPE) | |
CVE-2024-26306 | iPerf3 before 3.17, when used with OpenSSL before 3.2.0 as a server with RSA authentication, allows a timing side channel in RSA decryption operations. This side channel could be sufficient for an attacker to recover credential plaintext. It requires the attacker to send a large number of messages for decryption, as described in "Everlasting ROBOT: the Marvin Attack" by Hubert Kario. | Unknown | N/A | n/a | |
CVE-2024-26307 | Possible race condition vulnerability in Apache Doris. Some of code using `chmod()` method. This method run the risk of someone renaming the file out from under user and chmodding the wrong file. This could theoretically happen, but the impact would be minimal. This issue affects Apache Doris: before 1.2.8, before 2.0.4. Users are recommended to upgrade to version 2.0.4, which fixes the issue. | Unknown | N/A | Apache Software Foundation |
vunerability-insight.com © 2023 - 2025. All Rights Reserved.
Vulnerability Data Repositories v