CVE Vulnerabilities
CVE vulnerability database enriched with CISA KEV and NVD data
| CVE ID | CVSS | Severity | KEV | Sightings |
|---|---|---|---|---|
| CVE-2024-21976 Improper input validation in the NPU driver could allow an attacker to supply a specially crafted pointer potentially leading to arbitrary code execution. | 8.8 | HIGH | — | 0 |
| CVE-2024-51720 An insufficient entropy vulnerability in the SecuSUITE Secure Client Authentication (SCA) Server of SecuSUITE versions 5.0.420 and earlier could allow an attacker to potentially enroll an attacker-con... | 4.8 | MEDIUM | — | 0 |
| CVE-2024-52301 Laravel is a web application framework. When the register_argc_argv php directive is set to on , and users call any URL with a special crafted query string, they are able to change the environment use... | 7.5 | HIGH | — | 0 |
| CVE-2024-48075 A Heap buffer overflow in the server-site handshake implementation in Real Time Logic SharkSSL from 09/09/24 and earlier allows a remote attacker to trigger a Denial-of-Service via a malformed TLS Cli... | 5.3 | MEDIUM | — | 0 |
| CVE-2024-43090 In multiple locations, there is a possible cross-user image read due to a missing permission check. This could lead to local information disclosure with User execution privileges needed. User interact... | 5.0 | MEDIUM | — | 0 |
| CVE-2024-28952 Uncontrolled search path for some Intel(R) IPP software for Windows before version 2021.12.0 may allow an authenticated user to potentially enable escalation of privilege via local access. | 6.7 | MEDIUM | — | 0 |
| CVE-2024-32483 Improper access control for some Intel(R) EMA software before version 1.13.1.0 may allow an authenticated user to potentially enable escalation of privilege via local access. | 8.2 | HIGH | — | 0 |
| CVE-2024-36245 Uncontrolled search path element in some Intel(R) VTune(TM) Profiler software before version 2024.2.0 may allow an authenticated user to potentially enable escalation of privilege via local access. | 6.7 | MEDIUM | — | 0 |
| CVE-2024-37027 Improper Input validation in some Intel(R) VTune(TM) Profiler software before version 2024.2.0 may allow an authenticated user to potentially enable denial of service via local access. | 6.1 | MEDIUM | — | 0 |
| CVE-2024-11206 Unauthorized access vulnerability in the mobile application (com.transsion.phoenix) can lead to the leakage of user information. | 7.5 | HIGH | — | 0 |
| CVE-2024-41206 A stack-based buffer over-read in tsMuxer version nightly-2024-03-14-01-51-12 allows attackers to cause Information Disclosure via a crafted TS video file. | 6.5 | MEDIUM | — | 0 |
| CVE-2024-41209 A heap-based buffer overflow in tsMuxer version nightly-2024-03-14-01-51-12 allows attackers to cause Denial of Service (DoS) and Code Execution via a crafted MOV video file. | 8.8 | HIGH | — | 0 |
| CVE-2024-10443 Improper neutralization of special elements used in an OS command ('OS Command Injection') vulnerability in Task Manager component in Synology BeePhotos before 1.0.2-10026 and 1.1.0-10053 and Synology... | 9.8 | CRITICAL | — | 0 |
| CVE-2024-52520 Nextcloud Server is a self hosted personal cloud system. Due to a pre-flighted HEAD request, the link reference provider could be tricked into downloading bigger websites than intended, to find open-g... | 5.7 | MEDIUM | — | 0 |
| CVE-2024-11251 A vulnerability was found in erzhongxmu Jeewms up to 20241108. It has been rated as critical. This issue affects some unknown processing of the file cgReportController.do of the component AuthIntercep... | 6.3 | MEDIUM | — | 0 |
| CVE-2024-52509 Nextcloud Mail is the mail app for Nextcloud, a self-hosted productivity platform. The Nextcloud mail app incorrectly allowed attaching shared files without download permissions as attachments. This a... | 3.5 | LOW | — | 0 |
| CVE-2024-52510 The Nextcloud Desktop Client is a tool to synchronize files from Nextcloud Server with your computer. The Desktop client did not stop with an error but allowed by-passing the signature validation, if ... | 4.2 | MEDIUM | — | 0 |
| CVE-2024-52544 An unauthenticated attacker can trigger a stack based buffer overflow in the DP Service (TCP port 3500). This vulnerability has been resolved in firmware version 2.800.0000000.8.R.20241111. | 9.8 | CRITICAL | — | 0 |
| CVE-2024-11319 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in django CMS Association django-cms allows Cross-Site Scripting (XSS).This issue affects djan... | 4.8 | MEDIUM | — | 0 |
| CVE-2024-47820 MarkUs, a web application for the submission and grading of student assignments, is vulnerable to path traversal in versions prior to 2.4.8. Authenticated instructors may download any file on the web ... | 5.7 | MEDIUM | — | 0 |
| CVE-2024-51499 MarkUs is a web application for the submission and grading of student assignments. In versions prior to 2.4.8, an arbitrary file write vulnerability accessible via the update_files method of the Submi... | 8.8 | HIGH | — | 0 |
| CVE-2024-51743 MarkUs is a web application for the submission and grading of student assignments. In versions prior to 2.4.8, an arbitrary file write vulnerability in the update/upload/create file methods in Control... | 8.8 | HIGH | — | 0 |
| CVE-2024-51503 A security agent manual scan command injection vulnerability in the Trend Micro Deep Security 20 Agent could allow an attacker to escalate privileges and execute arbitrary code on an affected machine.... | 8.0 | HIGH | — | 0 |
| CVE-2024-7016 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Smarttek Informatics Smart Doctor's allows Stored XSS required admin privileges.This issue ... | 4.8 | MEDIUM | — | 0 |
| CVE-2024-52547 An authenticated attacker can trigger a stack based buffer overflow in the DHIP Service (TCP port 80). This vulnerability has been resolved in firmware version 2.800.0000000.8.R.20241111. | 7.2 | HIGH | — | 0 |
| CVE-2024-52803 LLama Factory enables fine-tuning of large language models. A critical remote OS command injection vulnerability has been identified in the LLama Factory training process. This vulnerability arises fr... | 7.5 | HIGH | — | 0 |
| CVE-2024-32767 A cross-site scripting (XSS) vulnerability has been reported to affect Photo Station. If exploited, the vulnerability could allow remote attackers who have gained user access to inject malicious code.... | 6.3 | MEDIUM | — | 0 |
| CVE-2024-32768 A cross-site scripting (XSS) vulnerability has been reported to affect Photo Station. If exploited, the vulnerability could allow remote attackers who have gained user access to inject malicious code.... | 6.3 | MEDIUM | — | 0 |
| CVE-2024-32769 A cross-site scripting (XSS) vulnerability has been reported to affect Photo Station. If exploited, the vulnerability could allow remote attackers who have gained user access to inject malicious code.... | 6.3 | MEDIUM | — | 0 |
| CVE-2024-32770 A cross-site scripting (XSS) vulnerability has been reported to affect Photo Station. If exploited, the vulnerability could allow remote attackers who have gained user access to inject malicious code.... | 6.3 | MEDIUM | — | 0 |
| CVE-2024-38643 A missing authentication for critical function vulnerability has been reported to affect Notes Station 3. If exploited, the vulnerability could allow remote attackers to gain access to and execute cer... | 9.8 | CRITICAL | — | 0 |
| CVE-2024-38644 An OS command injection vulnerability has been reported to affect Notes Station 3. If exploited, the vulnerability could allow remote authenticated attackers to execute commands. We have already fixe... | 8.8 | HIGH | — | 0 |
| CVE-2024-38645 A server-side request forgery (SSRF) vulnerability has been reported to affect Notes Station 3. If exploited, the vulnerability could allow remote authenticated attackers to read application data. We... | 6.5 | MEDIUM | — | 0 |
| CVE-2024-38646 An incorrect permission assignment for critical resource vulnerability has been reported to affect Notes Station 3. If exploited, the vulnerability could allow local authenticated attackers who have g... | 6.0 | MEDIUM | — | 0 |
| CVE-2024-52802 RIOT is an operating system for internet of things (IoT) devices. In version 2024.04 and prior, the function `_parse_advertise`, located in `/sys/net/application_layer/dhcpv6/client.c`, has no minimum... | 7.5 | HIGH | — | 0 |
| CVE-2024-53253 Sentry is an error tracking and performance monitoring platform. Version 24.11.0, and only version 24.11.0, is vulnerable to a scenario where a specific error message generated by the Sentry platform ... | 5.3 | MEDIUM | — | 0 |
| CVE-2024-11619 A vulnerability, which was classified as problematic, has been found in macrozheng mall up to 1.0.3. Affected by this issue is some unknown functionality of the component JWT Token Handler. The manipu... | 5.0 | MEDIUM | — | 0 |
| CVE-2024-11586 Ubuntu's implementation of pulseaudio can be crashed by a malicious program if a bluetooth headset is connected. | 4.0 | MEDIUM | — | 0 |
| CVE-2024-52529 Cilium is a networking, observability, and security solution with an eBPF-based dataplane. For users with the following configuration: 1. An allow policy that selects a Layer 3 destination and a port ... | 5.8 | MEDIUM | — | 0 |
| CVE-2024-53261 SvelteKit is a framework for rapidly developing robust, performant web applications using Svelte. "Unsanitized input from *the request URL* flows into `end`, where it is used to render an HTML page re... | 5.4 | MEDIUM | — | 0 |
| CVE-2024-53262 SvelteKit is a framework for rapidly developing robust, performant web applications using Svelte. The static error.html template for errors contains placeholders that are replaced without escaping the... | 5.4 | MEDIUM | — | 0 |
| CVE-2024-36626 In prestashop 8.1.4, a NULL pointer dereference was identified in the math_round function within Tools.php. | 5.3 | MEDIUM | — | 0 |
| CVE-2024-36620 moby v25.0.0 - v26.0.2 is vulnerable to NULL Pointer Dereference via daemon/images/image_history.go. | 6.5 | MEDIUM | — | 0 |
| CVE-2024-53980 RIOT is an open-source microcontroller operating system, designed to match the requirements of Internet of Things (IoT) devices and other embedded devices. A malicious actor can send a IEEE 802.15.4 p... | 7.5 | HIGH | — | 0 |
| CVE-2024-12138 A vulnerability classified as critical was found in horilla up to 1.2.1. This vulnerability affects the function request_new/get_employee_shift/create_reimbursement/key_result_current_value_update/cre... | 6.3 | MEDIUM | — | 0 |
| CVE-2024-53566 An issue in the action_listcategories() function of Sangoma Asterisk v22/22.0.0/22.0.0-rc1/22.0.0-rc2/22.0.0-pre1 allows attackers to execute a path traversal. | 5.5 | MEDIUM | — | 0 |
| CVE-2024-37302 Synapse is an open-source Matrix homeserver. Synapse versions before 1.106 are vulnerable to a disk fill attack, where an unauthenticated adversary can induce Synapse to download and cache large amoun... | 7.5 | HIGH | — | 0 |
| CVE-2024-37303 Synapse is an open-source Matrix homeserver. Synapse before version 1.106 allows, by design, unauthenticated remote participants to trigger a download and caching of remote media from a remote homeser... | 5.3 | MEDIUM | — | 0 |
| CVE-2024-52805 Synapse is an open-source Matrix homeserver. In Synapse before 1.120.1, multipart/form-data requests can in certain configurations transiently increase memory consumption beyond expected levels while ... | 7.5 | HIGH | — | 0 |
| CVE-2024-52815 Synapse is an open-source Matrix homeserver. Synapse versions before 1.120.1 fail to properly validate invites received over federation. This vulnerability allows a malicious server to send a speciall... | 5.3 | MEDIUM | — | 0 |
This product uses data from the NVD API but is not endorsed or certified by the NVD.