Vulnerabilities (CVE)

Filtered by CWE-20
Total 10395 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2024-30054 1 Microsoft 1 Powerbi-javascript 2025-01-08 N/A 6.5 MEDIUM
Microsoft Power BI Client JavaScript SDK Information Disclosure Vulnerability
CVE-2024-20670 1 Microsoft 2 Outlook, Windows 2025-01-08 N/A 8.1 HIGH
Outlook for Windows Spoofing Vulnerability
CVE-2025-22137 2025-01-08 N/A 9.8 CRITICAL
Pingvin Share is a self-hosted file sharing platform and an alternative for WeTransfer. This vulnerability allows an authenticated or unauthenticated (if anonymous shares are allowed) user to overwrite arbitrary files on the server, including sensitive system files, via HTTP POST requests. The issue has been patched in version 1.4.0.
CVE-2024-26189 1 Microsoft 13 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 10 more 2025-01-08 N/A 8.0 HIGH
Secure Boot Security Feature Bypass Vulnerability
CVE-2024-28897 1 Microsoft 13 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 10 more 2025-01-08 N/A 6.8 MEDIUM
Secure Boot Security Feature Bypass Vulnerability
CVE-2024-26253 1 Microsoft 14 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 11 more 2025-01-08 N/A 6.8 MEDIUM
Windows rndismp6.sys Remote Code Execution Vulnerability
CVE-2024-26240 1 Microsoft 14 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 11 more 2025-01-08 N/A 8.0 HIGH
Secure Boot Security Feature Bypass Vulnerability
CVE-2024-49073 1 Microsoft 9 Windows 10 1809, Windows 10 21h2, Windows 10 22h2 and 6 more 2025-01-08 N/A 6.8 MEDIUM
Windows Mobile Broadband Driver Elevation of Privilege Vulnerability
CVE-2024-49057 1 Microsoft 1 Defender For Endpoint 2025-01-08 N/A 8.1 HIGH
Microsoft Defender for Endpoint on Android Spoofing Vulnerability
CVE-2024-49087 1 Microsoft 9 Windows 10 1809, Windows 10 21h2, Windows 10 22h2 and 6 more 2025-01-08 N/A 4.6 MEDIUM
Windows Mobile Broadband Driver Information Disclosure Vulnerability
CVE-2024-47934 2025-01-08 N/A 5.3 MEDIUM
Improper Input Validation vulnerability in Management Program in TXOne Networks Portable Inspector and Portable Inspector Pro Edition allows remote attacker to crash management service. The Denial of Service situation can be resolved by restarting the management service. This issue affects Portable Inspector: through 1.0.0; Portable Inspector Pro Edition: through 1.0.0.
CVE-2024-51741 2025-01-06 N/A 4.4 MEDIUM
Redis is an open source, in-memory database that persists on disk. An authenticated with sufficient privileges may create a malformed ACL selector which, when accessed, triggers a server panic and subsequent denial of service. The problem is fixed in Redis 7.2.7 and 7.4.2.
CVE-2024-9257 1 Logsign 1 Unified Secops Platform 2025-01-03 N/A 6.5 MEDIUM
Logsign Unified SecOps Platform delete_gsuite_key_file Input Validation Arbitrary File Deletion Vulnerability. This vulnerability allows remote attackers to delete arbitrary files within sensitive directories on affected installations of Logsign Unified SecOps Platform. Authentication is required to exploit this vulnerability. The specific flaw exists within the delete_gsuite_key_file endpoint. The issue results from the lack of proper validation of a user-supplied filename prior to using it in file operations. An attacker can leverage this vulnerability to delete critical files on the system. Was ZDI-CAN-25265.
CVE-2024-27931 1 Deno 1 Deno 2025-01-03 N/A 5.8 MEDIUM
Deno is a JavaScript, TypeScript, and WebAssembly runtime with secure defaults. Insufficient validation of parameters in `Deno.makeTemp*` APIs would allow for creation of files outside of the allowed directories. This may allow the user to overwrite important files on the system that may affect other systems. A user may provide a prefix or suffix to a `Deno.makeTemp*` API containing path traversal characters. This is fixed in Deno 1.41.1.
CVE-2024-27932 1 Deno 1 Deno 2025-01-03 N/A 4.6 MEDIUM
Deno is a JavaScript, TypeScript, and WebAssembly runtime. Starting in version 1.8.0 and prior to version 1.40.4, Deno improperly checks that an import specifier's hostname is equal to or a child of a token's hostname, which can cause tokens to be sent to servers they shouldn't be sent to. An auth token intended for `example[.]com` may be sent to `notexample[.]com`. Anyone who uses DENO_AUTH_TOKENS and imports potentially untrusted code is affected. Version 1.40.0 contains a patch for this issue
CVE-2024-45802 1 Squid-cache 1 Squid 2025-01-03 N/A 7.5 HIGH
Squid is an open source caching proxy for the Web supporting HTTP, HTTPS, FTP, and more. Due to Input Validation, Premature Release of Resource During Expected Lifetime, and Missing Release of Resource after Effective Lifetime bugs, Squid is vulnerable to Denial of Service attacks by a trusted server against all clients using the proxy. This bug is fixed in the default build configuration of Squid version 6.10.
CVE-2024-32645 1 Vyperlang 1 Vyper 2025-01-02 N/A 5.3 MEDIUM
Vyper is a pythonic Smart Contract Language for the Ethereum virtual machine. In versions 0.3.10 and prior, incorrect values can be logged when `raw_log` builtin is called with memory or storage arguments to be used as topics. A contract search was performed and no vulnerable contracts were found in production. The `build_IR` function of the `RawLog` class fails to properly unwrap the variables provided as topics. Consequently, incorrect values are logged as topics. As of time of publication, no fixed version is available.
CVE-2024-32646 1 Vyperlang 1 Vyper 2025-01-02 N/A 5.3 MEDIUM
Vyper is a pythonic Smart Contract Language for the Ethereum virtual machine. In versions 0.3.10 and prior, using the `slice` builtin can result in a double eval vulnerability when the buffer argument is either `msg.data`, `self.code` or `<address>.code` and either the `start` or `length` arguments have side-effects. It can be easily triggered only with the versions `<0.3.4` as `0.3.4` introduced the unique symbol fence. No vulnerable production contracts were found. Additionally, double evaluation of side-effects should be easily discoverable in client tests. As such, the impact is low. As of time of publication, no fixed versions are available.
CVE-2024-29074 1 Openatom 1 Openharmony 2025-01-02 N/A 6.5 MEDIUM
in OpenHarmony v3.2.4 and prior versions allow a local attacker arbitrary code execution in any apps through improper input.
CVE-2024-7023 2 Google, Microsoft 2 Chrome, Windows 2025-01-02 N/A 8.8 HIGH
Insufficient data validation in Updater in Google Chrome prior to 128.0.6537.0 allowed a remote attacker to perform privilege escalation via a malicious file. (Chromium security severity: Medium)