Vulnerabilities
Vulnerable Software
Security Vulnerabilities - Known exploited
CVE-2024-37085
Known exploited
VMware ESXi contains an authentication bypass vulnerability. A malicious actor with sufficient Active Directory (AD) permissions can gain full access to an ESXi host that was previously configured to use AD for user management https://blogs.vmware.com/vsphere/2012/09/joining-vsphere-hosts-to-active-directory.html by re-creating the configured AD group ('ESXi Admins' by default) after it was deleted from AD.
CVSS Score
6.8
EPSS Score
0.732
Published
2024-06-25
CVE-2024-6047
Known exploited
Certain EOL GeoVision devices fail to properly filter user input for the specific functionality. Unauthenticated remote attackers can exploit this vulnerability to inject and execute arbitrary system commands on the device.
CVSS Score
9.8
EPSS Score
0.73
Published
2024-06-17
CVE-2024-32896
Known exploited
there is a possible way to bypass due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.
CVSS Score
7.8
EPSS Score
0.002
Published
2024-06-13
CVE-2024-34102
Known exploited
Adobe Commerce versions 2.4.7, 2.4.6-p5, 2.4.5-p7, 2.4.4-p8 and earlier are affected by an Improper Restriction of XML External Entity Reference ('XXE') vulnerability that could result in arbitrary code execution. An attacker could exploit this vulnerability by sending a crafted XML document that references external entities. Exploitation of this issue does not require user interaction.
CVSS Score
9.8
EPSS Score
0.941
Published
2024-06-13
CVE-2024-35250
Known exploited
Windows Kernel-Mode Driver Elevation of Privilege Vulnerability
CVSS Score
7.8
EPSS Score
0.597
Published
2024-06-11
CVE-2024-30088
Known exploited
Windows Kernel Elevation of Privilege Vulnerability
CVSS Score
7.0
EPSS Score
0.884
Published
2024-06-11
CVE-2024-36971
Known exploited
In the Linux kernel, the following vulnerability has been resolved: net: fix __dst_negative_advice() race __dst_negative_advice() does not enforce proper RCU rules when sk->dst_cache must be cleared, leading to possible UAF. RCU rules are that we must first clear sk->sk_dst_cache, then call dst_release(old_dst). Note that sk_dst_reset(sk) is implementing this protocol correctly, while __dst_negative_advice() uses the wrong order. Given that ip6_negative_advice() has special logic against RTF_CACHE, this means each of the three ->negative_advice() existing methods must perform the sk_dst_reset() themselves. Note the check against NULL dst is centralized in __dst_negative_advice(), there is no need to duplicate it in various callbacks. Many thanks to Clement Lecigne for tracking this issue. This old bug became visible after the blamed commit, using UDP sockets.
CVSS Score
7.8
EPSS Score
0.005
Published
2024-06-10
CVE-2024-4577
Known exploited
In PHP versions 8.1.* before 8.1.29, 8.2.* before 8.2.20, 8.3.* before 8.3.8, when using Apache and PHP-CGI on Windows, if the system is set up to use certain code pages, Windows may use "Best-Fit" behavior to replace characters in command line given to Win32 API functions. PHP CGI module may misinterpret those characters as PHP options, which may allow a malicious user to pass options to PHP binary being run, and thus reveal the source code of scripts, run arbitrary PHP code on the server, etc.
CVSS Score
9.8
EPSS Score
0.944
Published
2024-06-09
CVE-2024-4610
Known exploited
Use After Free vulnerability in Arm Ltd Bifrost GPU Kernel Driver, Arm Ltd Valhall GPU Kernel Driver allows a local non-privileged user to make improper GPU memory processing operations to gain access to already freed memory.This issue affects Bifrost GPU Kernel Driver: from r34p0 through r40p0; Valhall GPU Kernel Driver: from r34p0 through r40p0.
CVSS Score
7.8
EPSS Score
0.005
Published
2024-06-07
CVE-2024-37383
Known exploited
Roundcube Webmail before 1.5.7 and 1.6.x before 1.6.7 allows XSS via SVG animate attributes.
CVSS Score
6.1
EPSS Score
0.664
Published
2024-06-07


Contact Us

Shodan ® - All rights reserved