VYPR

CVEs

1,592 total · page 19 of 32

  • CVE-2024-13161KEVJan 14, 2025
    risk 0.19cvss epss 0.91

    Absolute path traversal in Ivanti EPM before the 2024 January-2025 Security Update and 2022 SU6 January-2025 Security Update allows a remote unauthenticated attacker to leak sensitive information.

  • CVE-2024-55550KEVDec 10, 2024
    risk 0.19cvss epss 0.18

    Mitel MiCollab through 9.8 SP2 could allow an authenticated attacker with administrative privilege to conduct a local file read, due to insufficient input sanitization. A successful exploit could allow the authenticated admin attacker to access resources that are constrained to the admin access level, and the disclosure is limited to non-sensitive system information. This vulnerability does not allow file modification or privilege escalation.

  • CVE-2024-43451KEVNov 12, 2024
    risk 0.19cvss epss 0.90

    NTLM Hash Disclosure Spoofing Vulnerability

  • CVE-2024-43468KEVOct 8, 2024
    risk 0.19cvss epss 0.83

    Microsoft Configuration Manager Remote Code Execution Vulnerability

  • CVE-2024-9380KEVOct 8, 2024
    risk 0.19cvss epss 0.87

    An OS command injection vulnerability in the admin web console of Ivanti CSA before version 5.0.2 allows a remote authenticated attacker with admin privileges to obtain remote code execution.

  • CVE-2024-8956KEVSep 17, 2024
    risk 0.19cvss epss 0.84

    PTZOptics PT30X-SDI/NDI-xx before firmware 6.3.40 is vulnerable to an insufficient authentication issue. The camera does not properly enforce authentication to /cgi-bin/param.cgi when requests are sent without an HTTP Authorization header. The result is a remote and unauthenticated attacker can leak sensitive data such as usernames, password hashes, and configurations details. Additionally, the attacker can update individual configuration values or overwrite the whole file.

  • CVE-2024-8190KEVSep 10, 2024
    risk 0.19cvss epss 0.92

    An OS command injection vulnerability in Ivanti Cloud Services Appliance versions 4.6 Patch 518 and before allows a remote authenticated attacker to obtain remote code execution. The attacker must have admin level privileges to exploit this vulnerability.

  • CVE-2024-20439KEVSep 4, 2024
    risk 0.19cvss epss 0.87

    A vulnerability in Cisco Smart Licensing Utility (CSLU) could allow an unauthenticated, remote attacker to log into an affected system by using a static administrative credential. This vulnerability is due to an undocumented static user credential for an administrative account. An attacker could exploit this vulnerability by using the static credentials to login to the affected system. A successful exploit could allow the attacker to login to the affected system with administrative rights over the CSLU application API.

  • CVE-2024-42009KEVAug 5, 2024
    risk 0.19cvss epss 0.91

    A Cross-Site Scripting vulnerability in Roundcube through 1.5.7 and 1.6.x through 1.6.7 allows a remote attacker to steal and send emails of a victim via a crafted e-mail message that abuses a Desanitization issue in message_body() in program/actions/mail/show.php.

  • CVE-2024-38112KEVJul 9, 2024
    risk 0.19cvss epss 0.93

    Windows MSHTML Platform Spoofing Vulnerability

  • CVE-2024-37079KEVJun 18, 2024
    risk 0.19cvss epss 0.82

    vCenter Server contains a heap-overflow vulnerability in the implementation of the DCERPC protocol. A malicious actor with network access to vCenter Server may trigger this vulnerability by sending a specially crafted network packet potentially leading to remote code execution.

  • CVE-2024-29059KEVMar 22, 2024
    risk 0.19cvss epss 0.94

    .NET Framework Information Disclosure Vulnerability

  • CVE-2024-21413KEVFeb 13, 2024
    risk 0.19cvss epss 0.93

    Microsoft Outlook Remote Code Execution Vulnerability

  • CVE-2023-7101KEVDec 24, 2023
    risk 0.19cvss epss 0.83

    Spreadsheet::ParseExcel version 0.65 is a Perl module used for parsing Excel files. Spreadsheet::ParseExcel is vulnerable to an arbitrary code execution (ACE) vulnerability due to passing unvalidated input from a file into a string-type “eval”. Specifically, the issue stems from the evaluation of Number format strings (not to be confused with printf-style format strings) within the Excel parsing logic.

  • CVE-2023-47565KEVDec 8, 2023
    risk 0.19cvss epss 0.87

    An OS command injection vulnerability has been found to affect legacy QNAP VioStor NVR models running QVR Firmware 4.x. If exploited, the vulnerability could allow authenticated users to execute commands via a network. We have already fixed the vulnerability in the following versions: QVR Firmware 5.0.0 and later

  • CVE-2023-36025KEVNov 14, 2023
    risk 0.19cvss epss 0.91

    Windows SmartScreen Security Feature Bypass Vulnerability

  • CVE-2023-34048KEVOct 25, 2023
    risk 0.19cvss epss 0.93

    vCenter Server contains an out-of-bounds write vulnerability in the implementation of the DCERPC protocol. A malicious actor with network access to vCenter Server may trigger an out-of-bounds write potentially leading to remote code execution.

  • CVE-2023-5631KEVOct 18, 2023
    risk 0.19cvss epss 0.84

    Roundcube before 1.4.15, 1.5.x before 1.5.5, and 1.6.x before 1.6.4 allows stored XSS via an HTML e-mail message with a crafted SVG document because of program/lib/Roundcube/rcube_washtml.php behavior. This could allow a remote attacker to load arbitrary JavaScript code.

  • CVE-2023-41064KEVSep 7, 2023
    risk 0.19cvss epss 0.85

    A buffer overflow issue was addressed with improved memory handling. This issue is fixed in iOS 16.6.1 and iPadOS 16.6.1, macOS Monterey 12.6.9, macOS Ventura 13.5.2, iOS 15.7.9 and iPadOS 15.7.9, macOS Big Sur 11.7.10. Processing a maliciously crafted image may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited.

  • CVE-2023-35081KEVAug 3, 2023
    risk 0.19cvss epss 0.91

    A path traversal vulnerability in Ivanti EPMM versions (11.10.x < 11.10.0.3, 11.9.x < 11.9.1.2 and 11.8.x < 11.8.1.2) allows an authenticated administrator to write arbitrary files onto the appliance.

  • CVE-2023-38950KEVAug 3, 2023
    risk 0.19cvss epss 0.83

    A path traversal vulnerability in the iclock API of ZKTeco BioTime v8.5.5 allows unauthenticated attackers to read arbitrary files via supplying a crafted payload. This vulnerability was fixed in version 9.0.120240617.19506 of ZKBioTime.

  • CVE-2023-34192KEVJul 6, 2023
    risk 0.19cvss epss 0.89

    Cross Site Scripting vulnerability in Zimbra ZCS v.8.8.15 allows a remote authenticated attacker to execute arbitrary code via a crafted script to the /h/autoSaveDraft function.

  • CVE-2023-27992KEVJun 19, 2023
    risk 0.19cvss epss 0.87

    The pre-authentication command injection vulnerability in the Zyxel NAS326 firmware versions prior to V5.21(AAZF.14)C0, NAS540 firmware versions prior to V5.21(AATB.11)C0, and NAS542 firmware versions prior to V5.21(ABAG.11)C0 could allow an unauthenticated attacker to execute some operating system (OS) commands remotely by sending a crafted HTTP request.

  • CVE-2023-33538KEVJun 7, 2023
    risk 0.19cvss epss 0.91

    TP-Link TL-WR940N V2/V4, TL-WR841N V8/V10, and TL-WR740N V1/V2 was discovered to contain a command injection vulnerability via the component /userRpm/WlanNetworkRpm .

  • CVE-2023-29552KEVApr 25, 2023
    risk 0.19cvss epss 0.92

    The Service Location Protocol (SLP, RFC 2608) allows an unauthenticated, remote attacker to register arbitrary services. This could allow the attacker to use spoofed UDP traffic to conduct a denial-of-service attack with a significant amplification factor.

  • CVE-2023-0386KEVMar 22, 2023
    risk 0.19cvss epss 0.54

    A flaw was found in the Linux kernel, where unauthorized access to the execution of the setuid file with capabilities was found in the Linux kernel’s OverlayFS subsystem in how a user copies a capable file from a nosuid mount into another mount. This uid mapping bug allows a local user to escalate their privileges on the system.

  • CVE-2023-25280KEVMar 16, 2023
    risk 0.19cvss epss 0.93

    OS Command injection vulnerability in D-Link DIR820LA1_FW105B03 allows attackers to escalate privileges to root via a crafted payload with the ping_addr parameter to ping.ccp.

  • CVE-2023-23397KEVMar 14, 2023
    risk 0.19cvss epss 0.93

    Microsoft Outlook Elevation of Privilege Vulnerability

  • CVE-2023-23376KEVFeb 14, 2023
    risk 0.19cvss epss 0.18

    Windows Common Log File System Driver Elevation of Privilege Vulnerability

  • CVE-2022-41091KEVNov 9, 2022
    risk 0.19cvss epss 0.06

    Windows Mark of the Web Security Feature Bypass Vulnerability

  • CVE-2022-3236KEVSep 23, 2022
    risk 0.19cvss epss 0.93

    A code injection vulnerability in the User Portal and Webadmin allows a remote attacker to execute code in Sophos Firewall version v19.0 MR1 and older.

  • CVE-2022-36537KEVAug 26, 2022
    risk 0.19cvss epss 0.94

    ZK Framework v9.6.1, 9.6.0.1, 9.5.1.3, 9.0.1.2 and 8.6.4.1 allows attackers to access sensitive information via a crafted POST request sent to the component AuUploader.

  • CVE-2022-21445KEVApr 19, 2022
    risk 0.19cvss epss 0.92

    Vulnerability in the Oracle Application Development Framework (ADF) product of Oracle Fusion Middleware (component: ADF Faces). Supported versions that are affected are 12.2.1.3.0 and 12.2.1.4.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Application Development Framework (ADF). Successful attacks of this vulnerability can result in takeover of Oracle Application Development Framework (ADF). Note: Oracle Application Development Framework (ADF) is downloaded via Oracle JDeveloper Product. Please refer to Fusion Middleware Patch Advisor for more details. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).

  • CVE-2022-24521KEVApr 15, 2022
    risk 0.19cvss epss 0.08

    Windows Common Log File System Driver Elevation of Privilege Vulnerability

  • CVE-2022-26258KEVMar 27, 2022
    risk 0.19cvss epss 0.87

    D-Link DIR-820L 1.05B03 was discovered to contain remote command execution (RCE) vulnerability via HTTP POST to get set ccp.

  • CVE-2022-26143KEVMar 9, 2022
    risk 0.19cvss epss 0.89

    The TP-240 (aka tp240dvr) component in Mitel MiCollab before 9.4 SP1 FP1 and MiVoice Business Express through 8.1 allows remote attackers to obtain sensitive information and cause a denial of service (performance degradation and excessive outbound traffic). This was exploited in the wild in February and March 2022 for the TP240PhoneHome DDoS attack.

  • CVE-2022-24086KEVFeb 16, 2022
    risk 0.19cvss epss 0.94

    Adobe Commerce versions 2.4.3-p1 (and earlier) and 2.3.7-p2 (and earlier) are affected by an improper input validation vulnerability during the checkout process. Exploitation of this issue does not require user interaction and could result in arbitrary code execution.

  • CVE-2022-21971KEVFeb 9, 2022
    risk 0.19cvss epss 0.88

    Windows Runtime Remote Code Execution Vulnerability

  • CVE-2022-23134KEVJan 13, 2022
    risk 0.19cvss epss 0.93

    After the initial setup process, some steps of setup.php file are reachable not only by super-administrators, but by unauthenticated users as well. Malicious actor can pass step checks and potentially change the configuration of Zabbix Frontend.

  • CVE-2021-30632KEVOct 8, 2021
    risk 0.19cvss epss 0.84

    Out of bounds write in V8 in Google Chrome prior to 93.0.4577.82 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.

  • CVE-2021-40655KEVSep 24, 2021
    risk 0.19cvss epss 0.93

    An informtion disclosure issue exists in D-LINK-DIR-605 B2 Firmware Version : 2.01MT. An attacker can obtain a user name and password by forging a post request to the / getcfg.php page

  • CVE-2021-38163KEVSep 14, 2021
    risk 0.19cvss epss 0.85

    SAP NetWeaver (Visual Composer 7.0 RT) versions - 7.30, 7.31, 7.40, 7.50, without restriction, an attacker authenticated as a non-administrative user can upload a malicious file over a network and trigger its processing, which is capable of running operating system commands with the privilege of the Java Server process. These commands can be used to read or modify any information on the server or shut the server down making it unavailable.

  • CVE-2021-37415KEVSep 1, 2021
    risk 0.19cvss epss 0.93

    Zoho ManageEngine ServiceDesk Plus before 11302 is vulnerable to authentication bypass that allows a few REST-API URLs without authentication.

  • CVE-2021-35395KEVAug 16, 2021
    risk 0.19cvss epss 0.94

    Realtek Jungle SDK version v2.x up to v3.4.14B provides an HTTP web server exposing a management interface that can be used to configure the access point. Two versions of this management interface exists: one based on Go-Ahead named webs and another based on Boa named boa. Both of them are affected by these vulnerabilities. Specifically, these binaries are vulnerable to the following issues: - stack buffer overflow in formRebootCheck due to unsafe copy of submit-url parameter - stack buffer overflow in formWsc due to unsafe copy of submit-url parameter - stack buffer overflow in formWlanMultipleAP due to unsafe copy of submit-url parameter - stack buffer overflow in formWlSiteSurvey due to unsafe copy of ifname parameter - stack buffer overflow in formStaticDHCP due to unsafe copy of hostname parameter - stack buffer overflow in formWsc due to unsafe copy of 'peerPin' parameter - arbitrary command execution in formSysCmd via the sysCmd parameter - arbitrary command injection in formWsc via the 'peerPin' parameter Exploitability of identified issues will differ based on what the end vendor/manufacturer did with the Realtek SDK webserver. Some vendors use it as-is, others add their own authentication implementation, some kept all the features from the server, some remove some of them, some inserted their own set of features. However, given that Realtek SDK implementation is full of insecure calls and that developers tends to re-use those examples in their custom code, any binary based on Realtek SDK webserver will probably contains its own set of issues on top of the Realtek ones (if kept). Successful exploitation of these issues allows remote attackers to gain arbitrary code execution on the device.

  • CVE-2021-36380KEVAug 13, 2021
    risk 0.19cvss epss 0.94

    Sunhillo SureLine before 8.7.0.1.1 allows Unauthenticated OS Command Injection via shell metacharacters in ipAddr or dnsAddr /cgi/networkDiag.cgi.

  • CVE-2021-33766KEVJul 14, 2021
    risk 0.19cvss epss 0.94

    Microsoft Exchange Server Information Disclosure Vulnerability

  • CVE-2021-30551KEVJun 15, 2021
    risk 0.19cvss epss 0.82

    Type confusion in V8 in Google Chrome prior to 91.0.4472.101 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.

  • CVE-2021-31956KEVJun 8, 2021
    risk 0.19cvss epss 0.91

    Windows NTFS Elevation of Privilege Vulnerability

  • CVE-2020-2509KEVApr 17, 2021
    risk 0.19cvss epss 0.84

    A command injection vulnerability has been reported to affect QTS and QuTS hero. If exploited, this vulnerability allows attackers to execute arbitrary commands in a compromised application. We have already fixed this vulnerability in the following versions: QTS 4.5.2.1566 Build 20210202 and later QTS 4.5.1.1495 Build 20201123 and later QTS 4.3.6.1620 Build 20210322 and later QTS 4.3.4.1632 Build 20210324 and later QTS 4.3.3.1624 Build 20210416 and later QTS 4.2.6 Build 20210327 and later QuTS hero h4.5.1.1491 build 20201119 and later

  • CVE-2021-21973KEVFeb 24, 2021
    risk 0.19cvss epss 0.90

    The vSphere Client (HTML5) contains an SSRF (Server Side Request Forgery) vulnerability due to improper validation of URLs in a vCenter Server plugin. A malicious actor with network access to port 443 may exploit this issue by sending a POST request to vCenter Server plugin leading to information disclosure. This affects: VMware vCenter Server (7.x before 7.0 U1c, 6.7 before 6.7 U3l and 6.5 before 6.5 U3n) and VMware Cloud Foundation (4.x before 4.2 and 3.x before 3.10.1.2).