Vulnerabilities
Vulnerable Software
Security Vulnerabilities - Known exploited
CVE-2024-3400
Known exploited
A command injection as a result of arbitrary file creation vulnerability in the GlobalProtect feature of Palo Alto Networks PAN-OS software for specific PAN-OS versions and distinct feature configurations may enable an unauthenticated attacker to execute arbitrary code with root privileges on the firewall. Cloud NGFW, Panorama appliances, and Prisma Access are not impacted by this vulnerability.
CVSS Score
10.0
EPSS Score
0.943
Published
2024-04-12
CVE-2024-29988
Known exploited
SmartScreen Prompt Security Feature Bypass Vulnerability
CVSS Score
8.8
EPSS Score
0.648
Published
2024-04-09
CVE-2024-29745
Known exploited
there is a possible Information Disclosure due to uninitialized data. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.
CVSS Score
5.5
EPSS Score
0.001
Published
2024-04-05
CVE-2024-29748
Known exploited
there is a possible way to bypass due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.
CVSS Score
7.8
EPSS Score
0.002
Published
2024-04-05
CVE-2024-3272
Known exploited
** UNSUPPORTED WHEN ASSIGNED ** A vulnerability, which was classified as very critical, has been found in D-Link DNS-320L, DNS-325, DNS-327L and DNS-340L up to 20240403. This issue affects some unknown processing of the file /cgi-bin/nas_sharing.cgi of the component HTTP GET Request Handler. The manipulation of the argument user with the input messagebus leads to hard-coded credentials. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-259283. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed immediately that the product is end-of-life. It should be retired and replaced.
CVSS Score
9.8
EPSS Score
0.942
Published
2024-04-04
CVE-2024-3273
Known exploited
** UNSUPPORTED WHEN ASSIGNED ** A vulnerability, which was classified as critical, was found in D-Link DNS-320L, DNS-325, DNS-327L and DNS-340L up to 20240403. Affected is an unknown function of the file /cgi-bin/nas_sharing.cgi of the component HTTP GET Request Handler. The manipulation of the argument system leads to command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-259284. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed immediately that the product is end-of-life. It should be retired and replaced.
CVSS Score
7.3
EPSS Score
0.944
Published
2024-04-04
CVE-2024-29059
Known exploited
.NET Framework Information Disclosure Vulnerability
CVSS Score
7.5
EPSS Score
0.937
Published
2024-03-23
CVE-2024-20767
Known exploited
ColdFusion versions 2023.6, 2021.12 and earlier are affected by an Improper Access Control vulnerability that could result in arbitrary file system read. An attacker could leverage this vulnerability to access or modify restricted files. Exploitation of this issue does not require user interaction. Exploitation of this issue requires the admin panel be exposed to the internet.
CVSS Score
7.4
EPSS Score
0.941
Published
2024-03-18
CVE-2024-26169
Known exploited
Windows Error Reporting Service Elevation of Privilege Vulnerability
CVSS Score
7.8
EPSS Score
0.264
Published
2024-03-12
CVE-2023-48788
Known exploited
A improper neutralization of special elements used in an sql command ('sql injection') in Fortinet FortiClientEMS version 7.2.0 through 7.2.2, FortiClientEMS 7.0.1 through 7.0.10 allows attacker to execute unauthorized code or commands via specially crafted packets.
CVSS Score
9.8
EPSS Score
0.942
Published
2024-03-12


Contact Us

Shodan ® - All rights reserved