Vulnerabilities
Vulnerable Software
Security Vulnerabilities - Known exploited
CVE-2024-32896
Known exploited
there is a possible way to bypass due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.
CVSS Score
7.8
EPSS Score
0.001
Published
2024-06-13
CVE-2024-34102
Known exploited
Adobe Commerce versions 2.4.7, 2.4.6-p5, 2.4.5-p7, 2.4.4-p8 and earlier are affected by an Improper Restriction of XML External Entity Reference ('XXE') vulnerability that could result in arbitrary code execution. An attacker could exploit this vulnerability by sending a crafted XML document that references external entities. Exploitation of this issue does not require user interaction.
CVSS Score
9.8
EPSS Score
0.941
Published
2024-06-13
CVE-2024-35250
Known exploited
Windows Kernel-Mode Driver Elevation of Privilege Vulnerability
CVSS Score
7.8
EPSS Score
0.445
Published
2024-06-11
CVE-2024-30088
Known exploited
Windows Kernel Elevation of Privilege Vulnerability
CVSS Score
7.0
EPSS Score
0.872
Published
2024-06-11
CVE-2024-36971
Known exploited
In the Linux kernel, the following vulnerability has been resolved: net: fix __dst_negative_advice() race __dst_negative_advice() does not enforce proper RCU rules when sk->dst_cache must be cleared, leading to possible UAF. RCU rules are that we must first clear sk->sk_dst_cache, then call dst_release(old_dst). Note that sk_dst_reset(sk) is implementing this protocol correctly, while __dst_negative_advice() uses the wrong order. Given that ip6_negative_advice() has special logic against RTF_CACHE, this means each of the three ->negative_advice() existing methods must perform the sk_dst_reset() themselves. Note the check against NULL dst is centralized in __dst_negative_advice(), there is no need to duplicate it in various callbacks. Many thanks to Clement Lecigne for tracking this issue. This old bug became visible after the blamed commit, using UDP sockets.
CVSS Score
7.8
EPSS Score
0.001
Published
2024-06-10
CVE-2024-4577
Known exploited
In PHP versions 8.1.* before 8.1.29, 8.2.* before 8.2.20, 8.3.* before 8.3.8, when using Apache and PHP-CGI on Windows, if the system is set up to use certain code pages, Windows may use "Best-Fit" behavior to replace characters in command line given to Win32 API functions. PHP CGI module may misinterpret those characters as PHP options, which may allow a malicious user to pass options to PHP binary being run, and thus reveal the source code of scripts, run arbitrary PHP code on the server, etc.
CVSS Score
9.8
EPSS Score
0.944
Published
2024-06-09
CVE-2024-4610
Known exploited
Use After Free vulnerability in Arm Ltd Bifrost GPU Kernel Driver, Arm Ltd Valhall GPU Kernel Driver allows a local non-privileged user to make improper GPU memory processing operations to gain access to already freed memory.This issue affects Bifrost GPU Kernel Driver: from r34p0 through r40p0; Valhall GPU Kernel Driver: from r34p0 through r40p0.
CVSS Score
7.8
EPSS Score
0.005
Published
2024-06-07
CVE-2024-37383
Known exploited
Roundcube Webmail before 1.5.7 and 1.6.x before 1.6.7 allows XSS via SVG animate attributes.
CVSS Score
6.1
EPSS Score
0.614
Published
2024-06-07
CVE-2024-28995
Known exploited
SolarWinds Serv-U was susceptible to a directory transversal vulnerability that would allow access to read sensitive files on the host machine.
CVSS Score
8.6
EPSS Score
0.944
Published
2024-06-06
CVE-2024-29824
Known exploited
An unspecified SQL Injection vulnerability in Core server of Ivanti EPM 2022 SU5 and prior allows an unauthenticated attacker within the same network to execute arbitrary code.
CVSS Score
9.6
EPSS Score
0.943
Published
2024-05-31


Contact Us

Shodan ® - All rights reserved