Vulnerabilities (CVE)

Filtered by CWE-20
Total 9852 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2024-21507 2024-11-21 N/A 6.5 MEDIUM
Versions of the package mysql2 before 3.9.3 are vulnerable to Improper Input Validation through the keyFromFields function, resulting in cache poisoning. An attacker can inject a colon (:) character within a value of the attacker-crafted key.
CVE-2024-21476 2024-11-21 N/A 7.8 HIGH
Memory corruption when the channel ID passed by user is not validated and further used.
CVE-2024-21473 2024-11-21 N/A 9.8 CRITICAL
Memory corruption while redirecting log file to any file location with any file name.
CVE-2024-21453 2024-11-21 N/A 7.5 HIGH
Transient DOS while decoding message of size that exceeds the available system memory.
CVE-2024-21452 2024-11-21 N/A 7.3 HIGH
Transient DOS while decoding an ASN.1 OER message containing a SEQUENCE of unknown extensions.
CVE-2024-21448 2024-11-21 N/A 5.0 MEDIUM
Microsoft Teams for Android Information Disclosure Vulnerability
CVE-2024-21413 1 Microsoft 3 365 Apps, Office, Office Long Term Servicing Channel 2024-11-21 N/A 9.8 CRITICAL
Microsoft Outlook Remote Code Execution Vulnerability
CVE-2024-21388 1 Microsoft 1 Edge Chromium 2024-11-21 N/A 6.5 MEDIUM
Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability
CVE-2024-21374 1 Microsoft 1 Teams 2024-11-21 N/A 5.0 MEDIUM
Microsoft Teams for Android Information Disclosure Vulnerability
CVE-2024-21319 1 Microsoft 3 .net, Identity Model, Visual Studio 2022 2024-11-21 N/A 6.8 MEDIUM
Microsoft Identity Denial of service vulnerability
CVE-2024-21316 1 Microsoft 10 Windows 10 1607, Windows 10 1809, Windows 10 21h2 and 7 more 2024-11-21 N/A 6.1 MEDIUM
Windows Server Key Distribution Service Security Feature Bypass
CVE-2024-21315 1 Microsoft 14 Defender For Endpoint, Windows 10 1507, Windows 10 1607 and 11 more 2024-11-21 N/A 7.8 HIGH
Microsoft Defender for Endpoint Protection Elevation of Privilege Vulnerability
CVE-2024-21312 1 Microsoft 13 .net Framework, Windows 10 1607, Windows 10 1809 and 10 more 2024-11-21 N/A 7.5 HIGH
.NET Framework Denial of Service Vulnerability
CVE-2024-21304 1 Microsoft 8 Windows 10 1809, Windows 10 21h2, Windows 10 22h2 and 5 more 2024-11-21 N/A 4.1 MEDIUM
Trusted Compute Base Elevation of Privilege Vulnerability
CVE-2024-20758 2024-11-21 N/A 9.0 CRITICAL
Adobe Commerce versions 2.4.6-p4, 2.4.5-p6, 2.4.4-p7, 2.4.7-beta3 and earlier are affected by an Improper Input Validation vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue does not require user interaction, but the attack complexity is high.
CVE-2024-20733 3 Adobe, Apple, Microsoft 6 Acrobat, Acrobat Dc, Acrobat Reader and 3 more 2024-11-21 N/A 5.5 MEDIUM
Acrobat Reader versions 20.005.30539, 23.008.20470 and earlier are affected by an Improper Input Validation vulnerability that could lead to an application denial-of-service. An attacker could leverage this vulnerability to cause the application to crash, resulting in a denial of service. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVE-2024-20684 1 Microsoft 5 Windows 11 21h2, Windows 11 22h2, Windows 11 23h2 and 2 more 2024-11-21 N/A 6.5 MEDIUM
Windows Hyper-V Denial of Service Vulnerability
CVE-2024-20670 2024-11-21 N/A 8.1 HIGH
Outlook for Windows Spoofing Vulnerability
CVE-2024-20666 1 Microsoft 11 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 8 more 2024-11-21 N/A 6.6 MEDIUM
BitLocker Security Feature Bypass Vulnerability
CVE-2024-20405 1 Cisco 1 Finesse 2024-11-21 N/A 4.8 MEDIUM
A vulnerability in the web-based management interface of Cisco Finesse could allow an unauthenticated, remote attacker to conduct a stored XSS attack by exploiting an RFI vulnerability. This vulnerability is due to insufficient validation of user-supplied input for specific HTTP requests that are sent to an affected device. An attacker could exploit this vulnerability by persuading a user to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive information on the affected device.