Lucene search

K

Internet Explorer, Microsoft Edge Security Vulnerabilities

alpinelinux
alpinelinux

CVE-2024-31460

Cacti provides an operational monitoring and fault management framework. Prior to version 1.2.27, some of the data stored in automation_tree_rules.php is not thoroughly checked and is used to concatenate the SQL statement in create_all_header_nodes() function from lib/api_automation.php , finally.....

8.7AI Score

0.0004EPSS

2024-05-14 03:25 PM
1
alpinelinux
alpinelinux

CVE-2024-31459

Cacti provides an operational monitoring and fault management framework. Prior to version 1.2.27, there is a file inclusion issue in the lib/plugin.php file. Combined with SQL injection vulnerabilities, remote code execution can be implemented. There is a file inclusion issue with the...

8.6AI Score

0.0004EPSS

2024-05-14 03:25 PM
2
alpinelinux
alpinelinux

CVE-2024-31458

Cacti provides an operational monitoring and fault management framework. Prior to version 1.2.27, some of the data stored in form_save() function in graph_template_inputs.php is not thoroughly checked and is used to concatenate the SQL statement in draw_nontemplated_fields_graph_item() function...

7.7AI Score

0.0004EPSS

2024-05-14 03:25 PM
2
alpinelinux
alpinelinux

CVE-2024-31445

Cacti provides an operational monitoring and fault management framework. Prior to version 1.2.27, a SQL injection vulnerability in automation_get_new_graphs_sql function of api_automation.php allows authenticated users to exploit these SQL injection vulnerabilities to perform privilege escalation.....

8.2AI Score

0.0004EPSS

2024-05-14 03:25 PM
2
alpinelinux
alpinelinux

CVE-2024-31443

Cacti provides an operational monitoring and fault management framework. Prior to 1.2.27, some of the data stored in form_save() function in data_queries.php is not thoroughly checked and is used to concatenate the HTML statement in grow_right_pane_tree() function from lib/html.php , finally...

6AI Score

0.0004EPSS

2024-05-14 03:25 PM
2
alpinelinux
alpinelinux

CVE-2024-31444

Cacti provides an operational monitoring and fault management framework. Prior to version 1.2.27, some of the data stored in automation_tree_rules_form_save() function in automation_tree_rules.php is not thoroughly checked and is used to concatenate the HTML statement in form_confirm() function...

6.3AI Score

0.0004EPSS

2024-05-14 03:25 PM
1
cve
cve

CVE-2024-30055

Microsoft Edge (Chromium-based) Spoofing...

5.4CVSS

7AI Score

0.0005EPSS

2024-05-14 03:21 PM
79
alpinelinux
alpinelinux

CVE-2024-29894

Cacti provides an operational monitoring and fault management framework. Versions of Cacti prior to 1.2.27 contain a residual cross-site scripting vulnerability caused by an incomplete fix for CVE-2023-50250. raise_message_javascript from lib/functions.php now uses purify.js to fix CVE-2023-50250.....

6.4AI Score

0.0004EPSS

2024-05-14 03:17 PM
1
alpinelinux
alpinelinux

CVE-2024-27282

An issue was discovered in Ruby 3.x through 3.3.0. If attacker-supplied data is provided to the Ruby regex compiler, it is possible to extract arbitrary heap data relative to the start of the text, including pointers and sensitive strings. The fixed versions are 3.0.7, 3.1.5, 3.2.4, and...

6.4AI Score

2024-05-14 03:11 PM
34
alpinelinux
alpinelinux

CVE-2024-27281

An issue was discovered in RDoc 6.3.3 through 6.6.2, as distributed in Ruby 3.x through 3.3.0. When parsing .rdoc_options (used for configuration in RDoc) as a YAML file, object injection and resultant remote code execution are possible because there are no restrictions on the classes that can be.....

7.5AI Score

2024-05-14 03:11 PM
5
alpinelinux
alpinelinux

CVE-2024-27280

A buffer-overread issue was discovered in StringIO 3.0.1, as distributed in Ruby 3.0.x through 3.0.6 and 3.1.x through 3.1.4. The ungetbyte and ungetc methods on a StringIO can read past the end of a string, and a subsequent call to StringIO.gets may return the memory value. 3.0.3 is the main...

6.2AI Score

2024-05-14 03:11 PM
6
alpinelinux
alpinelinux

CVE-2024-25641

Cacti provides an operational monitoring and fault management framework. Prior to version 1.2.27, an arbitrary file write vulnerability, exploitable through the "Package Import" feature, allows authenticated users having the "Import Templates" permission to execute arbitrary PHP code on the web...

7.7AI Score

0.0004EPSS

2024-05-14 03:05 PM
2
alpinelinux
alpinelinux

CVE-2024-25581

When incoming DNS over HTTPS support is enabled using the nghttp2 provider, and queries are routed to a tcp-only or DNS over TLS backend, an attacker can trigger an assertion failure in DNSdist by sending a request for a zone transfer (AXFR or IXFR) over DNS over HTTPS, causing the process to stop....

7.2AI Score

0.0004EPSS

2024-05-14 03:05 PM
1
ics
ics

Johnson Controls Software House C-CURE 9000

View CSAF 1. EXECUTIVE SUMMARY CVSS v3 7.7 ATTENTION: Low attack complexity Vendor: Johnson Controls Equipment: Software House C●CURE 9000 Vulnerability: Insertion of Sensitive Information into Log File 2. RISK EVALUATION Successful exploitation of this vulnerability may allow an attacker to...

7.1AI Score

2024-05-14 12:00 PM
6
cvelist
cvelist

CVE-2024-34773

A vulnerability has been identified in Solid Edge (All versions < V224.0 Update 2). The affected applications contain a stack overflow vulnerability while parsing specially crafted PAR files. This could allow an attacker to execute code in the context of the current...

7.7AI Score

0.0004EPSS

2024-05-14 10:03 AM
2
cvelist
cvelist

CVE-2024-34772

A vulnerability has been identified in Solid Edge (All versions < V224.0 Update 4). The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted PAR files. This could allow an attacker to execute code in the context of the current...

7.6AI Score

0.0004EPSS

2024-05-14 10:03 AM
3
cvelist
cvelist

CVE-2024-34771

A vulnerability has been identified in Solid Edge (All versions < V224.0 Update 2). The affected application is vulnerable to heap-based buffer overflow while parsing specially crafted PAR files. This could allow an attacker to execute code in the context of the current...

7.8AI Score

0.0004EPSS

2024-05-14 10:03 AM
2
cvelist
cvelist

CVE-2024-33493

A vulnerability has been identified in Solid Edge (All versions < V224.0 Update 5). The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted PAR files. This could allow an attacker to execute code in the context of the current...

7.6AI Score

0.0004EPSS

2024-05-14 10:02 AM
4
cvelist
cvelist

CVE-2024-33492

A vulnerability has been identified in Solid Edge (All versions < V224.0 Update 5). The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted PAR files. This could allow an attacker to execute code in the context of the current...

7.6AI Score

0.0004EPSS

2024-05-14 10:02 AM
2
cvelist
cvelist

CVE-2024-33491

A vulnerability has been identified in Solid Edge (All versions < V224.0 Update 5). The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted PAR files. This could allow an attacker to execute code in the context of the current...

7.6AI Score

0.0004EPSS

2024-05-14 10:02 AM
5
cvelist
cvelist

CVE-2024-33490

A vulnerability has been identified in Solid Edge (All versions < V224.0 Update 5). The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted PAR files. This could allow an attacker to execute code in the context of the current...

7.6AI Score

0.0004EPSS

2024-05-14 10:02 AM
4
cvelist
cvelist

CVE-2024-33489

A vulnerability has been identified in Solid Edge (All versions < V224.0 Update 5). The affected application is vulnerable to heap-based buffer overflow while parsing specially crafted PAR files. This could allow an attacker to execute code in the context of the current...

7.8AI Score

0.0004EPSS

2024-05-14 10:02 AM
4
mscve
mscve

Chromium: CVE-2024-4761 Out of bounds write in V8

This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more information. Google is aware that an exploit for CVE-2024-4761 exists in the...

6.4AI Score

0.006EPSS

2024-05-14 07:00 AM
13
mskb
mskb

May 14, 2024—KB5037800 (Monthly Rollup)

May 14, 2024—KB5037800 (Monthly Rollup) __ End of support information Windows Server 2008 SP2 Extended Security Updates (ESU) third and final year ended on January 10, 2023. Additionally, Extended Security Updates on Azure only support ended on January 9, 2024. For more information, see Extended...

7AI Score

2024-05-14 07:00 AM
5
mscve

6.6AI Score

0.001EPSS

2024-05-14 07:00 AM
5
mscve

8.9AI Score

0.009EPSS

2024-05-14 07:00 AM
11
mscve

7.7AI Score

0.002EPSS

2024-05-14 07:00 AM
7
mscve

6.4AI Score

0.0005EPSS

2024-05-14 07:00 AM
8
mscve

6.6AI Score

0.0004EPSS

2024-05-14 07:00 AM
4
mscve

8.2AI Score

0.001EPSS

2024-05-14 07:00 AM
3
mscve

5.7AI Score

0.0004EPSS

2024-05-14 07:00 AM
4
mscve

7.3AI Score

0.001EPSS

2024-05-14 07:00 AM
2
mscve

7.3AI Score

0.001EPSS

2024-05-14 07:00 AM
7
mskb
mskb

May 14, 2024—KB5037780 (Monthly Rollup)

May 14, 2024—KB5037780 (Monthly Rollup) __ End of support information As of January 10, 2023, Microsoft no longer provides security updates or technical support for Windows 7 Service Pack 1 (SP1). We recommend that you upgrade to a supported version of Windows. For more information, see Update...

7AI Score

2024-05-14 07:00 AM
26
mskb
mskb

May 14, 2024—KB5037765 (OS Build 17763.5820)

May 14, 2024—KB5037765 (OS Build 17763.5820) 11/17/20 For information about Windows update terminology, see the article about the types of Windows updates and the monthly quality update types. For an overview of Windows 10, version 1809, see its update history page. Highlights This update...

8.1AI Score

0.008EPSS

2024-05-14 07:00 AM
92
mscve

7.7AI Score

0.0004EPSS

2024-05-14 07:00 AM
9
mskb
mskb

May 14, 2024— KB5037848 (OS Build 20348.2458)

May 14, 2024— KB5037848 (OS Build 20348.2458) Improvements and fixes This security update includes quality improvements. When you install this KB: This update affects next secure record 3 (NSEC3) validation in a recursive resolver. Its limit is now 1,000 computations. One computation is equal to...

7.1AI Score

0.008EPSS

2024-05-14 07:00 AM
55
mskb
mskb

.NET 8.0 Update - May 14, 2024 (KB5038352)

.NET 8.0 Update - May 14, 2024 (KB5038352) NET 8.0 has been refreshed with the latest update as of May 14, 2024. This update contains both security and non-security fixes. See the release notes for details on updated packages..NET 8.0 servicing updates are upgrades. The latest servicing update for....

7AI Score

2024-05-14 07:00 AM
20
mskb
mskb

May 14, 2024—KB5037788 (OS Build 10240.20651)

May 14, 2024—KB5037788 (OS Build 10240.20651) 12/8/20 For information about Windows update terminology, see the article about the types of Windows updates and the monthly quality update types. For an overview of Windows 10, version 1507, see its update history page. Highlights This update...

7AI Score

0.008EPSS

2024-05-14 07:00 AM
7
mscve

7.6AI Score

0.0005EPSS

2024-05-14 07:00 AM
2
mscve

6.9AI Score

0.0005EPSS

2024-05-14 07:00 AM
2
mscve

6.6AI Score

0.0005EPSS

2024-05-14 07:00 AM
4
mscve

8.8AI Score

0.001EPSS

2024-05-14 07:00 AM
4
mscve

6.7AI Score

0.001EPSS

2024-05-14 07:00 AM
3
mscve

8.8AI Score

0.0004EPSS

2024-05-14 07:00 AM
5
mscve

7.1AI Score

0.001EPSS

2024-05-14 07:00 AM
1
Total number of security vulnerabilities173184