Total
1016 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2024-28915 | 2024-04-10 | N/A | 8.8 HIGH | ||
Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability | |||||
CVE-2024-26205 | 2024-04-10 | N/A | 8.8 HIGH | ||
Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability | |||||
CVE-2024-28935 | 2024-04-10 | N/A | 8.8 HIGH | ||
Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability | |||||
CVE-2024-26214 | 2024-04-10 | N/A | 8.8 HIGH | ||
Microsoft WDAC SQL Server ODBC Driver Remote Code Execution Vulnerability | |||||
CVE-2024-28941 | 2024-04-10 | N/A | 8.8 HIGH | ||
Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability | |||||
CVE-2024-26195 | 2024-04-10 | N/A | 7.2 HIGH | ||
DHCP Server Service Remote Code Execution Vulnerability | |||||
CVE-2024-28909 | 2024-04-10 | N/A | 8.8 HIGH | ||
Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability | |||||
CVE-2024-29984 | 2024-04-10 | N/A | 8.8 HIGH | ||
Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability | |||||
CVE-2024-28943 | 2024-04-10 | N/A | 8.8 HIGH | ||
Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability | |||||
CVE-2024-26200 | 2024-04-10 | N/A | 8.8 HIGH | ||
Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability | |||||
CVE-2024-29983 | 2024-04-10 | N/A | 8.8 HIGH | ||
Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability | |||||
CVE-2024-28937 | 2024-04-10 | N/A | 8.8 HIGH | ||
Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability | |||||
CVE-2024-27340 | 2024-04-03 | N/A | 7.8 HIGH | ||
Kofax Power PDF PDF File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Kofax Power PDF. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of PDF files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-22926. | |||||
CVE-2024-27341 | 2024-04-03 | N/A | 7.8 HIGH | ||
Kofax Power PDF PDF File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Kofax Power PDF. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of PDF files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-22927. | |||||
CVE-2024-21795 | 2024-04-02 | N/A | 9.8 CRITICAL | ||
A heap-based buffer overflow vulnerability exists in the .egi parsing functionality of The Biosig Project libbiosig 2.5.0 and Master Branch (ab0ee111). A specially crafted .egi file can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability. | |||||
CVE-2023-47039 | 2 Microsoft, Perl | 2 Windows, Perl | 2024-03-28 | N/A | 7.8 HIGH |
A vulnerability was found in Perl. This security issue occurs while Perl for Windows relies on the system path environment variable to find the shell (`cmd.exe`). When running an executable that uses the Windows Perl interpreter, Perl attempts to find and execute `cmd.exe` within the operating system. However, due to path search order issues, Perl initially looks for cmd.exe in the current working directory. This flaw allows an attacker with limited privileges to place`cmd.exe` in locations with weak permissions, such as `C:\ProgramData`. By doing so, arbitrary code can be executed when an administrator attempts to use this executable from these compromised locations. | |||||
CVE-2024-20259 | 2024-03-27 | N/A | 8.6 HIGH | ||
A vulnerability in the DHCP snooping feature of Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload unexpectedly, resulting in a denial of service (DoS) condition. This vulnerability is due to a crafted IPv4 DHCP request packet being mishandled when endpoint analytics are enabled. An attacker could exploit this vulnerability by sending a crafted DHCP request through an affected device. A successful exploit could allow the attacker to cause the device to reload, resulting in a DoS condition. Note: The attack vector is listed as network because a DHCP relay anywhere on the network could allow exploits from networks other than the adjacent one. | |||||
CVE-2024-21913 | 2024-03-26 | N/A | 7.8 HIGH | ||
A heap-based memory buffer overflow vulnerability in Rockwell Automation Arena Simulation software could potentially allow a malicious user to insert unauthorized code into the software by overstepping the memory boundaries, which triggers an access violation. Once inside, the threat actor can run harmful code on the system. This affects the confidentiality, integrity, and availability of the product. To trigger this, the user would unwittingly need to open a malicious file shared by the threat actor. | |||||
CVE-2024-28231 | 2024-03-21 | N/A | 9.6 CRITICAL | ||
eprosima Fast DDS is a C++ implementation of the Data Distribution Service standard of the Object Management Group. Prior to versions 2.14.0, 2.13.4, 2.12.3, 2.10.4, and 2.6.8, manipulated DATA Submessage can cause a heap overflow error in the Fast-DDS process, causing the process to be terminated remotely. Additionally, the payload_size in the DATA Submessage packet is declared as uint32_t. When a negative number, such as -1, is input into this variable, it results in an Integer Overflow (for example, -1 gets converted to 0xFFFFFFFF). This eventually leads to a heap-buffer-overflow, causing the program to terminate. Versions 2.14.0, 2.13.4, 2.12.3, 2.10.4, and 2.6.8 contain a fix for this issue. | |||||
CVE-2024-22453 | 2024-03-19 | N/A | 7.2 HIGH | ||
Dell PowerEdge Server BIOS contains a heap-based buffer overflow vulnerability. A local high privileged attacker could potentially exploit this vulnerability to write to otherwise unauthorized memory. |