Vulnerabilities
Vulnerable Software
Security Vulnerabilities - Known exploited
CVE-2024-0012
Known exploited
An authentication bypass in Palo Alto Networks PAN-OS software enables an unauthenticated attacker with network access to the management web interface to gain PAN-OS administrator privileges to perform administrative actions, tamper with the configuration, or exploit other authenticated privilege escalation vulnerabilities like CVE-2024-9474 https://security.paloaltonetworks.com/CVE-2024-9474 . The risk of this issue is greatly reduced if you secure access to the management web interface by restricting access to only trusted internal IP addresses according to our recommended  best practice deployment guidelines https://live.paloaltonetworks.com/t5/community-blogs/tips-amp-tricks-how-to-secure-the-management-access-of-your-palo/ba-p/464431 . This issue is applicable only to PAN-OS 10.2, PAN-OS 11.0, PAN-OS 11.1, and PAN-OS 11.2 software. Cloud NGFW and Prisma Access are not impacted by this vulnerability.
CVSS Score
9.8
EPSS Score
0.942
Published
2024-11-18
CVE-2024-11182
Known exploited
An XSS issue was discovered in MDaemon Email Server before version 24.5.1c. An attacker can send an HTML e-mail message with JavaScript in an img tag. This could allow a remote attacker to load arbitrary JavaScript code in the context of a webmail user's browser window.
CVSS Score
6.1
EPSS Score
0.351
Published
2024-11-15
CVE-2024-11120
Known exploited
Certain EOL GeoVision devices have an OS Command Injection vulnerability. Unauthenticated remote attackers can exploit this vulnerability to inject and execute arbitrary system commands on the device. Moreover, this vulnerability has already been exploited by attackers, and we have received related reports.
CVSS Score
9.8
EPSS Score
0.635
Published
2024-11-15
CVE-2024-43093
Known exploited
In shouldHideDocument of ExternalStorageProvider.java, there is a possible bypass of a file path filter designed to prevent access to sensitive directories due to incorrect unicode normalization. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.
CVSS Score
7.8
EPSS Score
0.0
Published
2024-11-13
CVE-2024-8068
Known exploited
Privilege escalation to NetworkService Account access in Citrix Session Recording when an attacker is an authenticated user in the same Windows Active Directory domain as the session recording server domain
CVSS Score
8.0
EPSS Score
0.035
Published
2024-11-12
CVE-2024-8069
Known exploited
Limited remote code execution with privilege of a NetworkService Account access in Citrix Session Recording if the attacker is an authenticated user on the same intranet as the session recording server
CVSS Score
8.0
EPSS Score
0.445
Published
2024-11-12
CVE-2024-49039
Known exploited
Windows Task Scheduler Elevation of Privilege Vulnerability
CVSS Score
8.8
EPSS Score
0.461
Published
2024-11-12
CVE-2024-43451
Known exploited
NTLM Hash Disclosure Spoofing Vulnerability
CVSS Score
6.5
EPSS Score
0.896
Published
2024-11-12
CVE-2024-51378
Known exploited
getresetstatus in dns/views.py and ftp/views.py in CyberPanel (aka Cyber Panel) before 1c0c6cb allows remote attackers to bypass authentication and execute arbitrary commands via /dns/getresetstatus or /ftp/getresetstatus by bypassing secMiddleware (which is only for a POST request) and using shell metacharacters in the statusfile property, as exploited in the wild in October 2024 by PSAUX. Versions through 2.3.6 and (unpatched) 2.3.7 are affected.
CVSS Score
10.0
EPSS Score
0.941
Published
2024-10-29
CVE-2024-51567
Known exploited
upgrademysqlstatus in databases/views.py in CyberPanel (aka Cyber Panel) before 5b08cd6 allows remote attackers to bypass authentication and execute arbitrary commands via /dataBases/upgrademysqlstatus by bypassing secMiddleware (which is only for a POST request) and using shell metacharacters in the statusfile property, as exploited in the wild in October 2024 by PSAUX. Versions through 2.3.6 and (unpatched) 2.3.7 are affected.
CVSS Score
10.0
EPSS Score
0.943
Published
2024-10-29


Contact Us

Shodan ® - All rights reserved