Vulnerabilities
Vulnerable Software
Security Vulnerabilities - Known exploited
CVE-2024-38106
Known exploited
Windows Kernel Elevation of Privilege Vulnerability
CVSS Score
7.0
EPSS Score
0.004
Published
2024-08-13
CVE-2024-38107
Known exploited
Windows Power Dependency Coordinator Elevation of Privilege Vulnerability
CVSS Score
7.8
EPSS Score
0.037
Published
2024-08-13
CVE-2024-41710
Known exploited
A vulnerability in the Mitel 6800 Series, 6900 Series, and 6900w Series SIP Phones, including the 6970 Conference Unit, through R6.4.0.HF1 (R6.4.0.136) could allow an authenticated attacker with administrative privilege to conduct an argument injection attack, due to insufficient parameter sanitization during the boot process. A successful exploit could allow an attacker to execute arbitrary commands within the context of the system.
CVSS Score
7.2
EPSS Score
0.082
Published
2024-08-12
CVE-2024-27443
Known exploited
An issue was discovered in Zimbra Collaboration (ZCS) 9.0 and 10.0. A Cross-Site Scripting (XSS) vulnerability exists in the CalendarInvite feature of the Zimbra webmail classic user interface, because of improper input validation in the handling of the calendar header. An attacker can exploit this via an email message containing a crafted calendar header with an embedded XSS payload. When a victim views this message in the Zimbra webmail classic interface, the payload is executed in the context of the victim's session, potentially leading to execution of arbitrary JavaScript code.
CVSS Score
6.1
EPSS Score
0.279
Published
2024-08-12
CVE-2024-42009
Known exploited
A Cross-Site Scripting vulnerability in Roundcube through 1.5.7 and 1.6.x through 1.6.7 allows a remote attacker to steal and send emails of a victim via a crafted e-mail message that abuses a Desanitization issue in message_body() in program/actions/mail/show.php.
CVSS Score
9.3
EPSS Score
0.876
Published
2024-08-05
CVE-2024-38856
Known exploited
Incorrect Authorization vulnerability in Apache OFBiz. This issue affects Apache OFBiz: through 18.12.14. Users are recommended to upgrade to version 18.12.15, which fixes the issue. Unauthenticated endpoints could allow execution of screen rendering code of screens if some preconditions are met (such as when the screen definitions don't explicitly check user's permissions because they rely on the configuration of their endpoints).
CVSS Score
9.8
EPSS Score
0.943
Published
2024-08-05
CVE-2023-45249
Known exploited
Remote command execution due to use of default passwords. The following products are affected: Acronis Cyber Infrastructure (ACI) before build 5.0.1-61, Acronis Cyber Infrastructure (ACI) before build 5.1.1-71, Acronis Cyber Infrastructure (ACI) before build 5.2.1-69, Acronis Cyber Infrastructure (ACI) before build 5.3.1-53, Acronis Cyber Infrastructure (ACI) before build 5.4.4-132.
CVSS Score
9.8
EPSS Score
0.765
Published
2024-07-24
CVE-2024-5910
Known exploited
Missing authentication for a critical function in Palo Alto Networks Expedition can lead to an Expedition admin account takeover for attackers with network access to Expedition. Note: Expedition is a tool aiding in configuration migration, tuning, and enrichment. Configuration secrets, credentials, and other data imported into Expedition is at risk due to this issue.
CVSS Score
9.8
EPSS Score
0.91
Published
2024-07-10
CVE-2024-4879
Known exploited
ServiceNow has addressed an input validation vulnerability that was identified in Vancouver and Washington DC Now Platform releases. This vulnerability could enable an unauthenticated user to remotely execute code within the context of the Now Platform. ServiceNow applied an update to hosted instances, and ServiceNow released the update to our partners and self-hosted customers. Listed below are the patches and hot fixes that address the vulnerability. If you have not done so already, we recommend applying security patches relevant to your instance as soon as possible.
CVSS Score
9.8
EPSS Score
0.943
Published
2024-07-10
CVE-2024-5217
Known exploited
ServiceNow has addressed an input validation vulnerability that was identified in the Washington DC, Vancouver, and earlier Now Platform releases. This vulnerability could enable an unauthenticated user to remotely execute code within the context of the Now Platform. The vulnerability is addressed in the listed patches and hot fixes below, which were released during the June 2024 patching cycle. If you have not done so already, we recommend applying security patches relevant to your instance as soon as possible.
CVSS Score
9.8
EPSS Score
0.942
Published
2024-07-10


Contact Us

Shodan ® - All rights reserved