Search Results (324504 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2024-28870 1 Oisf 1 Suricata 2025-04-28 7.5 High
Suricata is a network Intrusion Detection System, Intrusion Prevention System and Network Security Monitoring engine developed by the OISF and the Suricata community. When parsing an overly long SSH banner, Suricata can use excessive CPU resources, as well as cause excessive logging volume in alert records. This issue has been patched in versions 6.0.17 and 7.0.4.
CVE-2025-30727 1 Oracle 1 E-business Suite 2025-04-28 9.8 Critical
Vulnerability in the Oracle Scripting product of Oracle E-Business Suite (component: iSurvey Module). Supported versions that are affected are 12.2.3-12.2.14. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Scripting. Successful attacks of this vulnerability can result in takeover of Oracle Scripting. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
CVE-2024-44570 1 Relyum 2 Rely-pcie, Rely-pcie Firmware 2025-04-28 8.8 High
RELY-PCIe v22.2.1 to v23.1.0 was discovered to contain a code injection vulnerability via the getParams function in phpinf.php.
CVE-2022-3824 1 Wp Admin Ui Customize Project 1 Wp Admin Ui Customize 2025-04-28 4.8 Medium
The WP Admin UI Customize WordPress plugin before 1.5.13 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
CVE-2022-36924 1 Zoom 1 Rooms 2025-04-28 8.8 High
The Zoom Rooms Installer for Windows prior to 5.12.6 contains a local privilege escalation vulnerability. A local low-privileged user could exploit this vulnerability during the install process to escalate their privileges to the SYSTEM user.
CVE-2022-31617 2 Microsoft, Nvidia 7 Windows, Cloud Gaming Guest, Geforce and 4 more 2025-04-28 7.8 High
NVIDIA GPU Display Driver for Windows contains a vulnerability in the kernel mode layer (nvlddmkm.sys), where a local user with basic capabilities can cause an out-of-bounds read, which may lead to code execution, denial of service, escalation of privileges, information disclosure, or data tampering.
CVE-2024-44571 1 Relyum 2 Rely-pcie, Rely-pcie Firmware 2025-04-28 8.8 High
RELY-PCIe v22.2.1 to v23.1.0 was discovered to contain incorrect access control in the mService function at phpinf.php.
CVE-2024-44572 1 Relyum 2 Rely-pcie, Rely-pcie Firmware 2025-04-28 8.8 High
RELY-PCIe v22.2.1 to v23.1.0 was discovered to contain a command injection vulnerability via the sys_mgmt function.
CVE-2024-44573 1 Relyum 2 Rely-pcie, Rely-pcie Firmware 2025-04-28 4.7 Medium
A stored cross-site scripting (XSS) vulnerability in the VLAN configuration of RELY-PCIe v22.2.1 to v23.1.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload.
CVE-2024-44574 1 Relyum 2 Rely-pcie, Rely-pcie Firmware 2025-04-28 8.8 High
RELY-PCIe v22.2.1 to v23.1.0 was discovered to contain a command injection vulnerability via the sys_conf function.
CVE-2022-45422 1 Lg 1 Smart Share 2025-04-28 7.8 High
When LG SmartShare is installed, local privilege escalation is possible through DLL Hijacking attack. The LG ID is LVE-HOT-220005.
CVE-2022-23740 1 Github 1 Enterprise Server 2025-04-28 8.8 High
CRITICAL: An improper neutralization of argument delimiters in a command vulnerability was identified in GitHub Enterprise Server that enabled remote code execution. To exploit this vulnerability, an attacker would need permission to create and build GitHub Pages using GitHub Actions. This vulnerability affected only version 3.7.0 of GitHub Enterprise Server and was fixed in version 3.7.1. This vulnerability was reported via the GitHub Bug Bounty program.
CVE-2024-44575 1 Relyum 2 Rely-pcie, Rely-pcie Firmware 2025-04-28 3.7 Low
RELY-PCIe v22.2.1 to v23.1.0 does not set the Secure attribute for sensitive cookies in HTTPS sessions, which could cause the user agent to send those cookies in cleartext over an HTTP session.
CVE-2024-44577 1 Relyum 2 Rely-pcie, Rely-pcie Firmware 2025-04-28 8.8 High
RELY-PCIe v22.2.1 to v23.1.0 was discovered to contain a command injection vulnerability via the time_date function.
CVE-2024-42794 2 Kashipara, Lopalopa 2 Music Management System, Music Management System 2025-04-28 4.7 Medium
Kashipara Music Management System v1.0 is vulnerable to Incorrect Access Control via /music/ajax.php?action=save_user.
CVE-2024-42795 2 Kashipara, Lopalopa 2 Music Management System, Music Management System 2025-04-28 4.2 Medium
An Incorrect Access Control vulnerability was found in /music/view_user.php?id=3 and /music/controller.php?page=edit_user&id=3 in Kashipara Music Management System v1.0. This vulnerability allows an unauthenticated attacker to view valid user details.
CVE-2024-42796 2 Kashipara, Lopalopa 2 Music Management System, Music Management System 2025-04-28 5.9 Medium
An Incorrect Access Control vulnerability was found in /music/ajax.php?action=delete_genre in Kashipara Music Management System v1.0. This vulnerability allows an unauthenticated attacker to delete the valid music genre entries.
CVE-2024-42798 2 Kashipara, Lopalopa 2 Music Management System, Music Management System 2025-04-28 7.6 High
An Incorrect Access Control vulnerability was found in /music/index.php?page=user_list and /music/index.php?page=edit_user in Kashipara Music Management System v1.0. This allows a low privileged attacker to take over the administrator account.
CVE-2024-27717 1 Eskooly 2 Eskooly, Web Product 2025-04-28 6.5 Medium
Cross Site Request Forgery vulnerability in Eskooly Free Online School Management Software v.3.0 and before allows a remote attacker to escalate privileges via the Token Handling component.
CVE-2024-40425 2 Nanjing Xingyuantu Technology, Sparkshop 2 Sparkshop, Sparkshop 2025-04-28 9.8 Critical
File Upload vulnerability in Nanjin Xingyuantu Technology Co Sparkshop (Spark Mall B2C Mall v.1.1.6 and before allows a remote attacker to execute arbitrary code via the contorller/common.php component.