Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools

hpc_toolkit

Source -

ADP

CNA CVEs -

0

ADP CVEs -

577

CISA CVEs -

0

NVD CVEs -

0
Related CVEsRelated VendorsRelated AssignersReports
577Vulnerabilities found

CVE-2024-23580
Assigner-HCL Software
ShareView Details
Assigner-HCL Software
CVSS Score-6.5||MEDIUM
EPSS-0.13% / 32.37%
||
7 Day CHG~0.00%
Published-28 May, 2024 | 21:29
Updated-15 Apr, 2026 | 00:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
HCL DRYiCE Optibot Reset Station is impacted by insecure encryption of One-Time Passwords (OTPs)

HCL DRYiCE Optibot Reset Station is impacted by insecure encryption of One-Time Passwords (OTPs). This could allow an attacker with access to the database to recover some or all encrypted values.

Action-Not Available
Vendor-HCL Technologies Ltd.
Product-DRYiCE Optibot Reset Stationdryice_optibot_reset_station
CWE ID-CWE-326
Inadequate Encryption Strength
CVE-2024-23579
Assigner-HCL Software
ShareView Details
Assigner-HCL Software
CVSS Score-6.5||MEDIUM
EPSS-0.13% / 32.70%
||
7 Day CHG~0.00%
Published-28 May, 2024 | 21:25
Updated-15 Apr, 2026 | 00:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
HCL DRYiCE Optibot Reset Station is impacted by insecure encryption of security questions

HCL DRYiCE Optibot Reset Station is impacted by insecure encryption of security questions. This could allow an attacker with access to the database to recover some or all encrypted values.

Action-Not Available
Vendor-HCL Technologies Ltd.
Product-DRYiCE Optibot Reset Stationdryice_optibot_reset_station
CWE ID-CWE-326
Inadequate Encryption Strength
CVE-2024-22641
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-8.99% / 92.67%
||
7 Day CHG~0.00%
Published-28 May, 2024 | 20:17
Updated-03 Nov, 2025 | 20:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

TCPDF version 6.6.5 and before is vulnerable to ReDoS (Regular Expression Denial of Service) if parsing an untrusted SVG file.

Action-Not Available
Vendor-tcpdf_projectn/atcpdf_project
Product-tcpdfn/atcpdf
CWE ID-CWE-434
Unrestricted Upload of File with Dangerous Type
CVE-2024-24919
Assigner-Check Point Software Ltd.
ShareView Details
Assigner-Check Point Software Ltd.
CVSS Score-8.6||HIGH
EPSS-94.34% / 99.96%
||
7 Day CHG~0.00%
Published-28 May, 2024 | 18:22
Updated-24 Oct, 2025 | 13:54
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Known KEV||Action Due Date - 2024-06-20||Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Information disclosure

Potentially allowing an attacker to read certain information on Check Point Security Gateways once connected to the internet and enabled with remote Access VPN or Mobile Access Software Blades. A Security fix that mitigates this vulnerability is available.

Action-Not Available
Vendor-Check Point Software Technologies Ltd.
Product-quantum_security_gatewayquantum_security_gateway_firmwarequantum_sparkquantum_spark_firmwarecloudguard_network_securityCheck Point Quantum Gateway, Spark Gateway and CloudGuard Networkquantum_security_gateway_firmwarequantum_spark_appliancescloudguard_networkQuantum Security Gateways
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2024-22590
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-9.1||CRITICAL
EPSS-0.15% / 35.54%
||
7 Day CHG~0.00%
Published-28 May, 2024 | 16:07
Updated-15 Apr, 2026 | 00:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The TLS engine in Kwik commit 745fd4e2 does not track the current state of the connection. This vulnerability can allow Client Hello messages to be overwritten at any time, including after a connection has been established.

Action-Not Available
Vendor-n/aptrd
Product-n/akwik
CWE ID-CWE-372
Incomplete Internal State Distinction
CVE-2024-24851
Assigner-Talos
ShareView Details
Assigner-Talos
CVSS Score-7.5||HIGH
EPSS-0.47% / 64.64%
||
7 Day CHG~0.00%
Published-28 May, 2024 | 15:30
Updated-13 Feb, 2025 | 17:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A heap-based buffer overflow vulnerability exists in the Programming Software Connection FiBurn functionality of AutomationDirect P3-550E 1.2.10.9. A specially crafted network packet can lead to a buffer overflow. An attacker can send an unauthenticated packet to trigger this vulnerability.

Action-Not Available
Vendor-AutomationDirect
Product-p1-540_firmwarep3-550e_firmwarep3-550_firmwarep3-530p1-550_firmwarep2-550p3-550ep3-550p2-550_firmwarep1-540p3-530_firmwarep1-550P3-550Ep3-550e_firmware
CWE ID-CWE-805
Buffer Access with Incorrect Length Value
CWE ID-CWE-787
Out-of-bounds Write
CVE-2024-24947
Assigner-Talos
ShareView Details
Assigner-Talos
CVSS Score-8.2||HIGH
EPSS-0.51% / 66.70%
||
7 Day CHG~0.00%
Published-28 May, 2024 | 15:30
Updated-13 Feb, 2025 | 17:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A heap-based buffer overflow vulnerability exists in the Programming Software Connection CurrDir functionality of AutomationDirect P3-550E 1.2.10.9. A specially crafted network packet can lead to denial of service. An attacker can send an unauthenticated packet to trigger these vulnerability.This CVE tracks the heap corruption that occurs at offset `0xb68c4` of version 1.2.10.9 of the P3-550E firmware, which occurs when a call to `memset` relies on an attacker-controlled length value and corrupts any trailing heap allocations.

Action-Not Available
Vendor-AutomationDirect
Product-p1-540_firmwarep3-550e_firmwarep3-550_firmwarep3-530p1-550_firmwarep2-550p3-550ep3-550p2-550_firmwarep1-540p3-530_firmwarep1-550P3-550Ep3-550e
CWE ID-CWE-787
Out-of-bounds Write
CVE-2024-24946
Assigner-Talos
ShareView Details
Assigner-Talos
CVSS Score-8.2||HIGH
EPSS-0.51% / 66.70%
||
7 Day CHG~0.00%
Published-28 May, 2024 | 15:30
Updated-13 Feb, 2025 | 17:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A heap-based buffer overflow vulnerability exists in the Programming Software Connection CurrDir functionality of AutomationDirect P3-550E 1.2.10.9. A specially crafted network packet can lead to denial of service. An attacker can send an unauthenticated packet to trigger these vulnerability.This CVE tracks the heap corruption that occurs at offset `0xb686c` of version 1.2.10.9 of the P3-550E firmware, which occurs when a call to `memset` relies on an attacker-controlled length value and corrupts any trailing heap allocations.

Action-Not Available
Vendor-AutomationDirect
Product-p1-540_firmwarep3-550e_firmwarep3-550_firmwarep3-530p1-550_firmwarep2-550p3-550ep3-550p2-550_firmwarep1-540p3-530_firmwarep1-550P3-550Ep3-550e_firmware
CWE ID-CWE-787
Out-of-bounds Write
CVE-2024-24959
Assigner-Talos
ShareView Details
Assigner-Talos
CVSS Score-8.2||HIGH
EPSS-0.23% / 45.14%
||
7 Day CHG~0.00%
Published-28 May, 2024 | 15:30
Updated-13 Feb, 2025 | 17:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Several out-of-bounds write vulnerabilities exist in the Programming Software Connection FileSystem API functionality of AutomationDirect P3-550E 1.2.10.9. Specially crafted network packets can lead to heap-based memory corruption. An attacker can send malicious packets to trigger these vulnerabilities.This CVE tracks the arbitrary null-byte write vulnerability located in firmware 1.2.10.9 of the P3-550E at offset `0xb6c18`.

Action-Not Available
Vendor-AutomationDirect
Product-p3-550e_firmwarep3-550eP3-550Ep3-550e_firmware
CWE ID-CWE-787
Out-of-bounds Write
CVE-2024-24958
Assigner-Talos
ShareView Details
Assigner-Talos
CVSS Score-8.2||HIGH
EPSS-0.23% / 45.14%
||
7 Day CHG~0.00%
Published-28 May, 2024 | 15:30
Updated-13 Feb, 2025 | 17:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Several out-of-bounds write vulnerabilities exist in the Programming Software Connection FileSystem API functionality of AutomationDirect P3-550E 1.2.10.9. Specially crafted network packets can lead to heap-based memory corruption. An attacker can send malicious packets to trigger these vulnerabilities.This CVE tracks the arbitrary null-byte write vulnerability located in firmware 1.2.10.9 of the P3-550E at offset `0xb6bdc`.

Action-Not Available
Vendor-AutomationDirect
Product-p3-550e_firmwarep3-550eP3-550Ep3-550e_firmware
CWE ID-CWE-787
Out-of-bounds Write
CVE-2024-24957
Assigner-Talos
ShareView Details
Assigner-Talos
CVSS Score-8.2||HIGH
EPSS-0.23% / 45.14%
||
7 Day CHG~0.00%
Published-28 May, 2024 | 15:30
Updated-13 Feb, 2025 | 17:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Several out-of-bounds write vulnerabilities exist in the Programming Software Connection FileSystem API functionality of AutomationDirect P3-550E 1.2.10.9. Specially crafted network packets can lead to heap-based memory corruption. An attacker can send malicious packets to trigger these vulnerabilities.This CVE tracks the arbitrary null-byte write vulnerability located in firmware 1.2.10.9 of the P3-550E at offset `0xb6aa4`.

Action-Not Available
Vendor-AutomationDirect
Product-p3-550e_firmwarep3-550eP3-550Ep3-550e_firmware
CWE ID-CWE-787
Out-of-bounds Write
CVE-2024-24956
Assigner-Talos
ShareView Details
Assigner-Talos
CVSS Score-8.2||HIGH
EPSS-0.23% / 45.14%
||
7 Day CHG~0.00%
Published-28 May, 2024 | 15:30
Updated-13 Feb, 2025 | 17:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Several out-of-bounds write vulnerabilities exist in the Programming Software Connection FileSystem API functionality of AutomationDirect P3-550E 1.2.10.9. Specially crafted network packets can lead to heap-based memory corruption. An attacker can send malicious packets to trigger these vulnerabilities.This CVE tracks the arbitrary null-byte write vulnerability located in firmware 1.2.10.9 of the P3-550E at offset `0xb6a38`.

Action-Not Available
Vendor-AutomationDirect
Product-p3-550e_firmwarep3-550eP3-550Ep3-550e_firmware
CWE ID-CWE-787
Out-of-bounds Write
CVE-2024-24955
Assigner-Talos
ShareView Details
Assigner-Talos
CVSS Score-8.2||HIGH
EPSS-0.23% / 45.14%
||
7 Day CHG~0.00%
Published-28 May, 2024 | 15:30
Updated-13 Feb, 2025 | 17:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Several out-of-bounds write vulnerabilities exist in the Programming Software Connection FileSystem API functionality of AutomationDirect P3-550E 1.2.10.9. Specially crafted network packets can lead to heap-based memory corruption. An attacker can send malicious packets to trigger these vulnerabilities.This CVE tracks the arbitrary null-byte write vulnerability located in firmware 1.2.10.9 of the P3-550E at offset `0xb69fc`.

Action-Not Available
Vendor-AutomationDirect
Product-p3-550e_firmwarep3-550eP3-550Ep3-550e_firmware
CWE ID-CWE-787
Out-of-bounds Write
CVE-2024-24954
Assigner-Talos
ShareView Details
Assigner-Talos
CVSS Score-8.2||HIGH
EPSS-0.23% / 45.14%
||
7 Day CHG~0.00%
Published-28 May, 2024 | 15:30
Updated-13 Feb, 2025 | 17:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Several out-of-bounds write vulnerabilities exist in the Programming Software Connection FileSystem API functionality of AutomationDirect P3-550E 1.2.10.9. Specially crafted network packets can lead to heap-based memory corruption. An attacker can send malicious packets to trigger these vulnerabilities.This CVE tracks the arbitrary null-byte write vulnerability located in firmware 1.2.10.9 of the P3-550E at offset `0xb69c8`.

Action-Not Available
Vendor-AutomationDirect
Product-p3-550e_firmwarep3-550eP3-550Ep3-550e_firmware
CWE ID-CWE-787
Out-of-bounds Write
CVE-2024-24963
Assigner-Talos
ShareView Details
Assigner-Talos
CVSS Score-9.8||CRITICAL
EPSS-0.52% / 66.73%
||
7 Day CHG~0.00%
Published-28 May, 2024 | 15:30
Updated-13 Feb, 2025 | 17:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A stack-based buffer overflow vulnerability exists in the Programming Software Connection FileSelect functionality of AutomationDirect P3-550E 1.2.10.9. A specially crafted network packet can lead to stack-based buffer overflow. An attacker can send an unauthenticated packet to trigger this vulnerability.This CVE tracks the stack-based buffer overflow that occurs at offset `0xb6e84` of v1.2.10.9 of the P3-550E firmware.

Action-Not Available
Vendor-AutomationDirect
Product-p1-540_firmwarep3-550e_firmwarep3-550_firmwarep3-530p1-550_firmwarep2-550p3-550ep3-550p2-550_firmwarep1-540p3-530_firmwarep1-550P3-550Ep3-550e_firmware
CWE ID-CWE-121
Stack-based Buffer Overflow
CWE ID-CWE-787
Out-of-bounds Write
CVE-2024-24962
Assigner-Talos
ShareView Details
Assigner-Talos
CVSS Score-9.8||CRITICAL
EPSS-0.52% / 66.73%
||
7 Day CHG~0.00%
Published-28 May, 2024 | 15:30
Updated-13 Feb, 2025 | 17:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A stack-based buffer overflow vulnerability exists in the Programming Software Connection FileSelect functionality of AutomationDirect P3-550E 1.2.10.9. A specially crafted network packet can lead to stack-based buffer overflow. An attacker can send an unauthenticated packet to trigger this vulnerability.This CVE tracks the stack-based buffer overflow that occurs at offset `0xb6e98` of v1.2.10.9 of the P3-550E firmware.

Action-Not Available
Vendor-AutomationDirect
Product-p1-540_firmwarep3-550e_firmwarep3-550_firmwarep3-530p1-550_firmwarep2-550p3-550ep3-550p2-550_firmwarep1-540p3-530_firmwarep1-550P3-550Ep3-550e_firmware
CWE ID-CWE-121
Stack-based Buffer Overflow
CWE ID-CWE-787
Out-of-bounds Write
CVE-2024-23315
Assigner-Talos
ShareView Details
Assigner-Talos
CVSS Score-7.5||HIGH
EPSS-0.34% / 56.67%
||
7 Day CHG~0.00%
Published-28 May, 2024 | 15:30
Updated-13 Feb, 2025 | 17:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A read-what-where vulnerability exists in the Programming Software Connection IMM 01A1 Memory Read functionality of AutomationDirect P3-550E 1.2.10.9. A specially crafted network packet can lead to a disclosure of sensitive information. An attacker can send an unauthenticated packet to trigger this vulnerability.

Action-Not Available
Vendor-AutomationDirect
Product-p1-540_firmwarep3-550e_firmwarep3-550_firmwarep3-530p1-550_firmwarep2-550p3-550ep3-550p2-550_firmwarep1-540p3-530_firmwarep1-550P3-550Ep3-550e_firmware
CWE ID-CWE-284
Improper Access Control
CVE-2024-23601
Assigner-Talos
ShareView Details
Assigner-Talos
CVSS Score-9.8||CRITICAL
EPSS-1.20% / 79.07%
||
7 Day CHG~0.00%
Published-28 May, 2024 | 15:30
Updated-13 Feb, 2025 | 17:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A code injection vulnerability exists in the scan_lib.bin functionality of AutomationDirect P3-550E 1.2.10.9. A specially crafted scan_lib.bin can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability.

Action-Not Available
Vendor-AutomationDirect
Product-p1-540_firmwarep3-550e_firmwarep3-550_firmwarep3-530p1-550_firmwarep2-550p3-550ep3-550p2-550_firmwarep1-540p3-530_firmwarep1-550P3-550Ep3-550e_firmware
CWE ID-CWE-345
Insufficient Verification of Data Authenticity
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CVE-2024-23951
Assigner-Talos
ShareView Details
Assigner-Talos
CVSS Score-8.8||HIGH
EPSS-0.22% / 44.27%
||
7 Day CHG~0.00%
Published-28 May, 2024 | 14:02
Updated-13 Feb, 2025 | 17:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Multiple improper array index validation vulnerabilities exist in the readMSH functionality of libigl v2.5.0. A specially crafted .msh file can lead to an out-of-bounds write. An attacker can provide a malicious file to trigger this vulnerability.This vulnerability concerns the `igl::MshLoader::parse_element_field` function while handling an `ascii`.msh` file.

Action-Not Available
Vendor-libigllibigllibigl
Product-libigllibigllibigl
CWE ID-CWE-787
Out-of-bounds Write
CVE-2024-23950
Assigner-Talos
ShareView Details
Assigner-Talos
CVSS Score-8.8||HIGH
EPSS-0.22% / 44.27%
||
7 Day CHG~0.00%
Published-28 May, 2024 | 14:02
Updated-13 Feb, 2025 | 17:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Multiple improper array index validation vulnerabilities exist in the readMSH functionality of libigl v2.5.0. A specially crafted .msh file can lead to an out-of-bounds write. An attacker can provide a malicious file to trigger this vulnerability.This vulnerability concerns the `igl::MshLoader::parse_element_field` function while handling an `binary`.msh` file.

Action-Not Available
Vendor-libigllibigllibigl
Product-libigllibigllibigl
CWE ID-CWE-787
Out-of-bounds Write
CVE-2024-23949
Assigner-Talos
ShareView Details
Assigner-Talos
CVSS Score-8.8||HIGH
EPSS-0.22% / 44.27%
||
7 Day CHG~0.00%
Published-28 May, 2024 | 14:02
Updated-13 Feb, 2025 | 17:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Multiple improper array index validation vulnerabilities exist in the readMSH functionality of libigl v2.5.0. A specially crafted .msh file can lead to an out-of-bounds write. An attacker can provide a malicious file to trigger this vulnerability.This vulnerability concerns the `igl::MshLoader::parse_node_field` function while handling an `ascii`.msh` file.

Action-Not Available
Vendor-libigllibigllibigl
Product-libigllibigllibigl
CWE ID-CWE-787
Out-of-bounds Write
CVE-2024-23948
Assigner-Talos
ShareView Details
Assigner-Talos
CVSS Score-8.8||HIGH
EPSS-0.25% / 47.85%
||
7 Day CHG~0.00%
Published-28 May, 2024 | 14:02
Updated-13 Feb, 2025 | 17:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Multiple improper array index validation vulnerabilities exist in the readMSH functionality of libigl v2.5.0. A specially crafted .msh file can lead to an out-of-bounds write. An attacker can provide a malicious file to trigger this vulnerability.This vulnerability concerns the `igl::MshLoader::parse_nodes` function while handling an `ascii`.msh` file.

Action-Not Available
Vendor-libigllibigllibigl
Product-libigllibigllibigl
CWE ID-CWE-787
Out-of-bounds Write
CVE-2024-23947
Assigner-Talos
ShareView Details
Assigner-Talos
CVSS Score-8.8||HIGH
EPSS-0.24% / 47.48%
||
7 Day CHG~0.00%
Published-28 May, 2024 | 14:02
Updated-13 Feb, 2025 | 17:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Multiple improper array index validation vulnerabilities exist in the readMSH functionality of libigl v2.5.0. A specially crafted .msh file can lead to an out-of-bounds write. An attacker can provide a malicious file to trigger this vulnerability.This vulnerability concerns the `igl::MshLoader::parse_nodes` function while handling a `binary` `.msh` file.

Action-Not Available
Vendor-libigllibigllibigl
Product-libigllibigllibigl
CWE ID-CWE-787
Out-of-bounds Write
CVE-2024-24584
Assigner-Talos
ShareView Details
Assigner-Talos
CVSS Score-4.3||MEDIUM
EPSS-0.26% / 49.80%
||
7 Day CHG~0.00%
Published-28 May, 2024 | 14:02
Updated-13 Feb, 2025 | 17:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Multiple out-of-bounds read vulnerabilities exist in the readMSH functionality of libigl v2.5.0. A specially crafted .msh file can lead to an out-of-bounds read. An attacker can provide a malicious file to trigger this vulnerability.This vulnerabilitty concerns the`readMSH` function while processing `MshLoader::ELEMENT_TET` elements.

Action-Not Available
Vendor-libigllibigllibigl
Product-libigllibigllibigl
CWE ID-CWE-125
Out-of-bounds Read
CVE-2024-24686
Assigner-Talos
ShareView Details
Assigner-Talos
CVSS Score-7.8||HIGH
EPSS-9.00% / 92.67%
||
7 Day CHG~0.00%
Published-28 May, 2024 | 14:02
Updated-13 Feb, 2025 | 17:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Multiple stack-based buffer overflow vulnerabilities exist in the readOFF functionality of libigl v2.5.0. A specially crafted .off file can lead to stack-based buffer overflow. An attacker can provide a malicious file to trigger this vulnerability.This vulnerability concerns the parsing of comments within the faces section of an `.off` file processed via the `readOFF` function.

Action-Not Available
Vendor-libigllibiglligibl
Product-libigllibiglligibl
CWE ID-CWE-121
Stack-based Buffer Overflow
CWE ID-CWE-787
Out-of-bounds Write
CVE-2024-24684
Assigner-Talos
ShareView Details
Assigner-Talos
CVSS Score-7.8||HIGH
EPSS-21.93% / 95.81%
||
7 Day CHG~0.00%
Published-28 May, 2024 | 14:02
Updated-13 Feb, 2025 | 17:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Multiple stack-based buffer overflow vulnerabilities exist in the readOFF functionality of libigl v2.5.0. A specially crafted .off file can lead to stack-based buffer overflow. An attacker can provide a malicious file to trigger this vulnerability.This vulnerability concerns the header parsing occuring while processing an `.off` file via the `readOFF` function. We can see above that at [0] a stack-based buffer called `comment` is defined with an hardcoded size of `1000 bytes`. The call to `fscanf` at [1] is unsafe and if the first line of the header of the `.off` files is longer than 1000 bytes it will overflow the `header` buffer.

Action-Not Available
Vendor-libigllibigllibigl
Product-libigllibigllibigl
CWE ID-CWE-121
Stack-based Buffer Overflow
CWE ID-CWE-787
Out-of-bounds Write
CVE-2024-22588
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-6.5||MEDIUM
EPSS-0.04% / 12.45%
||
7 Day CHG~0.00%
Published-24 May, 2024 | 14:55
Updated-15 Apr, 2026 | 00:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Kwik commit 745fd4e2 does not discard unused encryption keys.

Action-Not Available
Vendor-n/aptrd
Product-n/akwik
CWE ID-CWE-400
Uncontrolled Resource Consumption
CVE-2024-24293
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-8.8||HIGH
EPSS-0.12% / 30.96%
||
7 Day CHG~0.00%
Published-20 May, 2024 | 17:26
Updated-15 Apr, 2026 | 00:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A Prototype Pollution issue in MiguelCastillo @bit/loader v.10.0.3 allows an attacker to execute arbitrary code via the M function e argument in index.js.

Action-Not Available
Vendor-n/amiguelcastillo
Product-n/abit-loader
CWE ID-CWE-1321
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')
CVE-2024-24294
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.15% / 35.40%
||
7 Day CHG~0.00%
Published-20 May, 2024 | 16:25
Updated-15 Apr, 2026 | 00:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A Prototype Pollution issue in Blackprint @blackprint/engine v.0.9.0 allows an attacker to execute arbitrary code via the _utils.setDeepProperty function of engine.min.js.

Action-Not Available
Vendor-n/ablackprint
Product-n/ablackprint_engine
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CVE-2024-23556
Assigner-HCL Software
ShareView Details
Assigner-HCL Software
CVSS Score-5.9||MEDIUM
EPSS-0.34% / 56.99%
||
7 Day CHG~0.00%
Published-17 May, 2024 | 23:40
Updated-08 Jan, 2026 | 20:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
HCL BigFix Platform is impacted by a failure to restrict SSL/TLS renegotiation

SSL/TLS Renegotiation functionality potentially leading to DoS attack vulnerability.

Action-Not Available
Vendor-HCL Technologies Ltd.
Product-bigfix_platformBigFix Platformbigfix_platform
CVE-2024-23554
Assigner-HCL Software
ShareView Details
Assigner-HCL Software
CVSS Score-5.7||MEDIUM
EPSS-0.50% / 66.29%
||
7 Day CHG~0.00%
Published-17 May, 2024 | 23:31
Updated-08 Jan, 2026 | 20:00
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
HCL BigFix Platform is susceptible to Cross-Site Request Forgery

Cross-Site Request Forgery (CSRF) on Session Token vulnerability that could potentially lead to Remote Code Execution (RCE).

Action-Not Available
Vendor-HCL Technologies Ltd.
Product-bigfix_platformBigFix Platformbigfix_platform
CWE ID-CWE-352
Cross-Site Request Forgery (CSRF)
CVE-2024-23583
Assigner-HCL Software
ShareView Details
Assigner-HCL Software
CVSS Score-6.7||MEDIUM
EPSS-0.07% / 22.01%
||
7 Day CHG~0.00%
Published-17 May, 2024 | 23:06
Updated-08 Jan, 2026 | 19:58
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
HCL BigFix Platform is susceptible to insufficiently protected credentials

An attacker could potentially intercept credentials via the task manager and perform unauthorized access to the Client Deploy Tool on Windows systems.

Action-Not Available
Vendor-HCL Technologies Ltd.Microsoft Corporation
Product-bigfix_platformwindowsBigFix Platformbigfix_platform
CWE ID-CWE-522
Insufficiently Protected Credentials
CVE-2024-22429
Assigner-Dell
ShareView Details
Assigner-Dell
CVSS Score-7.5||HIGH
EPSS-0.06% / 17.43%
||
7 Day CHG~0.00%
Published-17 May, 2024 | 15:20
Updated-30 Jan, 2025 | 15:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Dell BIOS contains an Improper Input Validation vulnerability. A local authenticated malicious user with admin privileges could potentially exploit this vulnerability, leading to arbitrary code execution.

Action-Not Available
Vendor-Dell Inc.
Product-latitude_3189_firmwarelatitude_5590latitude_12_rugged_extreme_7214latitude_5480latitude_5488_firmwarelatitude_3190_2-in-1latitude_5424_rugged_firmwareoptiplex_3050precision_5530_2-in-1_firmwareembedded_box_pc_3000_firmwarelatitude_5290_firmwarelatitude_13_3380latitude_5490_firmwarelatitude_3300optiplex_7450_all-in-one_firmwarelatitude_5488optiplex_7450_all-in-onelatitude_5480_firmwarelatitude_5288_firmwarelatitude_3190latitude_3189edge_gateway_3000latitude_5400wyse_7040_thin_clientlatitude_3390_2-in-1latitude_5280_firmwarewyse_5070embedded_box_pc_3000latitude_7285_2-in-1_firmwareoptiplex_3050_firmwarelatitude_7390_2-in-1_firmwareprecision_3520latitude_7290_firmwareprecision_3420_tower_firmwarelatitude_5414_rugged_firmwarelatitude_5400_firmwareoptiplex_5050_firmwarelatitude_3190_firmwareembedded_box_pc_5000precision_5820_towerprecision_3620_tower_firmwarelatitude_7424_rugged_extremelatitude_7480_firmwareprecision_7720_firmwareprecision_3620_towerprecision_7520latitude_7212_rugged_extreme_tablet_firmwarelatitude_7280latitude_7380_firmwarelatitude_5414_ruggedlatitude_7212_rugged_extreme_tabletlatitude_3180latitude_3190_2-in-1_firmwarelatitude_5424_ruggedlatitude_7280_firmwarelatitude_3300_firmwarelatitude_3180_firmwareprecision_3520_firmwarelatitude_7390_2-in-1edge_gateway_5000_firmwarelatitude_5288precision_5520edge_gateway_5000latitude_5290_2-in-1precision_5820_tower_firmwarelatitude_7285_2-in-1latitude_7390_firmwarelatitude_7490latitude_5290_2-in-1_firmwarelatitude_5290latitude_7290latitude_13_3380_firmwarelatitude_5420_ruggededge_gateway_3000_firmwarelatitude_5590_firmwareprecision_7720latitude_5490precision_7520_firmwarelatitude_5280precision_5530_2-in-1embedded_box_pc_5000_firmwarelatitude_5420_rugged_firmwarelatitude_7414_rugged_firmwareprecision_5520_firmwarewyse_5070_firmwarelatitude_3390_2-in-1_firmwarelatitude_5580latitude_7490_firmwareoptiplex_5050latitude_5580_firmwarelatitude_7390wyse_7040_thin_client_firmwarelatitude_7424_rugged_extreme_firmwareoptiplex_3050_all-in-one_firmwareoptiplex_3050_all-in-onelatitude_7380latitude_7414_ruggedprecision_3420_towerlatitude_12_rugged_extreme_7214_firmwarelatitude_7480CPG BIOSedge_gateway_3000_firmwareprecision_3620_towerlatitude_3180_firmwarelatitude_3189_firmwarelatitude_5280_firmwarelatitude_5424_firmwarelatitude_3300_firmwarelatitude_13_3380latitude_12_rugged_extreme_7214_firmwarelatitude_7212_rugged_extreme_tablet_firmwareprecision_3420_towerlatitude_3390_2-in-1wyse_5070latitude_7414_rugged_extreme_firmwarelatitude_5414_firmware
CWE ID-CWE-20
Improper Input Validation
CVE-2024-24934
Assigner-Patchstack
ShareView Details
Assigner-Patchstack
CVSS Score-8.5||HIGH
EPSS-0.88% / 75.42%
||
7 Day CHG~0.00%
Published-17 May, 2024 | 08:50
Updated-28 Apr, 2026 | 16:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
WordPress Elementor plugin <= 3.19.0 - Arbitrary File Deletion and Phar Deserialization vulnerability

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Elementor Elementor Website Builder allows Manipulating Web Input to File System Calls.This issue affects Elementor Website Builder: from n/a through 3.19.0.

Action-Not Available
Vendor-elementorElementorelementor
Product-website_builderElementor Website Builderwebsite_builder
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2024-24882
Assigner-Patchstack
ShareView Details
Assigner-Patchstack
CVSS Score-9.8||CRITICAL
EPSS-48.28% / 97.76%
||
7 Day CHG~0.00%
Published-17 May, 2024 | 08:48
Updated-29 Apr, 2026 | 10:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
WordPress LMS by Masteriyo plugin <= 1.7.2 - Privilege Escalation vulnerability

Incorrect Privilege Assignment vulnerability in masteriyo Masteriyo - LMS learning-management-system.This issue affects Masteriyo - LMS: from n/a through <= 1.7.2.

Action-Not Available
Vendor-themegrillmasteriyomasteriyo
Product-masteriyoMasteriyo - LMSmasteriyo
CWE ID-CWE-266
Incorrect Privilege Assignment
CVE-2024-24869
Assigner-Patchstack
ShareView Details
Assigner-Patchstack
CVSS Score-7.5||HIGH
EPSS-1.42% / 80.71%
||
7 Day CHG~0.00%
Published-17 May, 2024 | 08:48
Updated-28 Apr, 2026 | 16:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
WordPress Total Upkeep plugin <= 1.15.8 - Arbitrary File Download vulnerability

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in BoldGrid Total Upkeep allows Relative Path Traversal.This issue affects Total Upkeep: from n/a through 1.15.8.

Action-Not Available
Vendor-BoldGrid (InMotion Hosting, Inc.)
Product-total_upkeepTotal Upkeeptotal_upkeep
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2024-24715
Assigner-Patchstack
ShareView Details
Assigner-Patchstack
CVSS Score-6.5||MEDIUM
EPSS-0.20% / 41.18%
||
7 Day CHG~0.00%
Published-17 May, 2024 | 08:48
Updated-28 Apr, 2026 | 16:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
WordPress WordPress BookIt Plugin plugin <= 2.4.0 - Price Bypass Vulnerability vulnerability

Improper Validation of Specified Quantity in Input vulnerability in The Events Calendar BookIt allows Manipulating Hidden Fields.This issue affects BookIt: from n/a through 2.4.0.

Action-Not Available
Vendor-The Events Calendarthe_events_calendar
Product-BookItbookit
CWE ID-CWE-1284
Improper Validation of Specified Quantity in Input
CVE-2024-23522
Assigner-Patchstack
ShareView Details
Assigner-Patchstack
CVSS Score-5.3||MEDIUM
EPSS-0.31% / 53.88%
||
7 Day CHG~0.00%
Published-17 May, 2024 | 08:47
Updated-28 Apr, 2026 | 16:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
WordPress Formidable Forms plugin <= 6.7 - Content Injection vulnerability

Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) vulnerability in Strategy11 Form Builder Team Formidable Forms allows Code Injection.This issue affects Formidable Forms: from n/a through 6.7.

Action-Not Available
Vendor-Strategy11
Product-formidable_formsFormidable Formsformidable_forms
CWE ID-CWE-80
Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2024-24873
Assigner-Patchstack
ShareView Details
Assigner-Patchstack
CVSS Score-5.3||MEDIUM
EPSS-0.21% / 43.18%
||
7 Day CHG~0.00%
Published-17 May, 2024 | 08:24
Updated-28 Apr, 2026 | 16:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
WordPress Polls CP plugin <= 1.0.71 - Polls Limitation Bypass vulnerability

: Improper Control of Interaction Frequency vulnerability in CodePeople CP Polls allows Flooding.This issue affects CP Polls: from n/a through 1.0.71.

Action-Not Available
Vendor-CodePeople
Product-CP Pollspolls_cp
CWE ID-CWE-799
Improper Control of Interaction Frequency
CVE-2024-24874
Assigner-Patchstack
ShareView Details
Assigner-Patchstack
CVSS Score-5.3||MEDIUM
EPSS-0.16% / 36.32%
||
7 Day CHG~0.00%
Published-17 May, 2024 | 08:23
Updated-28 Apr, 2026 | 16:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
WordPress Polls CP plugin <= 1.0.71 - Content Injection vulnerability

Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) vulnerability in CodePeople CP Polls allows Code Injection.This issue affects CP Polls: from n/a through 1.0.71.

Action-Not Available
Vendor-CodePeople
Product-CP Pollspolls_cp
CWE ID-CWE-80
Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)
CVE-2024-22379
Assigner-Intel Corporation
ShareView Details
Assigner-Intel Corporation
CVSS Score-6.7||MEDIUM
EPSS-0.08% / 23.20%
||
7 Day CHG~0.00%
Published-16 May, 2024 | 20:47
Updated-15 Apr, 2026 | 00:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Uncontrolled search path in some Intel(R) Inspector software before version 2024.0 may allow an authenticated user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-Intel(R) Inspector softwareinspectorhpc_toolkit
CWE ID-CWE-427
Uncontrolled Search Path Element
CVE-2024-22390
Assigner-Intel Corporation
ShareView Details
Assigner-Intel Corporation
CVSS Score-4.4||MEDIUM
EPSS-0.07% / 20.41%
||
7 Day CHG~0.00%
Published-16 May, 2024 | 20:47
Updated-15 Apr, 2026 | 00:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper input validation in firmware for some Intel(R) FPGA products before version 2.9.1 may allow denial of service.

Action-Not Available
Vendor-n/aIntel Corporation
Product-Intel(R) FPGA productsagilex_7_fpga_f-series_023_firmwareagilex_7_fpga_f-series_006_firmwareagilex_7_fpga_f-series_008_firmwareagilex_7_fpga_f-series_019_firmwareagilex_7_fpga_i-series_023_firmwareagilex_7_fpga_i-series_022_firmwareagilex_7_fpga_i-series_019_firmwareagilex_7_fpga_i-series_035_firmwareagilex_7_fpga_i-series_040_firmwareagilex_7_fpga_f-series_022_firmwareagilex_7_fpga_i-series_041_firmwareagilex_7_fpga_f-series_012_firmwareagilex_7_fpga_f-series_027_firmwareagilex_7_fpga_i-series_027_firmwareagilex_7_fpga_f-series_014_firmwareagilex_7_fpga_m-series_039_firmware
CWE ID-CWE-20
Improper Input Validation
CVE-2024-23980
Assigner-Intel Corporation
ShareView Details
Assigner-Intel Corporation
CVSS Score-7.5||HIGH
EPSS-0.10% / 26.23%
||
7 Day CHG~0.00%
Published-16 May, 2024 | 20:46
Updated-15 Apr, 2026 | 00:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper buffer restrictions in PlatformPfrDxe driver in UEFI firmware for some Intel(R) Server D50FCP Family products may allow a privileged user to enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-UEFI firmware for some Intel(R) Server D50FCP Family productsserver_system_d50tnp2mhsvac_firmware
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2024-24981
Assigner-Intel Corporation
ShareView Details
Assigner-Intel Corporation
CVSS Score-7.5||HIGH
EPSS-0.10% / 26.23%
||
7 Day CHG~0.00%
Published-16 May, 2024 | 20:46
Updated-15 Apr, 2026 | 00:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper input validation in PfrSmiUpdateFw driver in UEFI firmware for some Intel(R) Server M50FCP Family products may allow a privileged user to enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-UEFI firmware for some Intel(R) Server M50FCP Family productsserver_board_s2600bp_firmwareintel_server_d50fcp_familyintel_server_m50fcp_family
CWE ID-CWE-20
Improper Input Validation
CVE-2024-23487
Assigner-Intel Corporation
ShareView Details
Assigner-Intel Corporation
CVSS Score-7.5||HIGH
EPSS-0.10% / 26.42%
||
7 Day CHG~0.00%
Published-16 May, 2024 | 20:46
Updated-15 Apr, 2026 | 00:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper input validation in UserAuthenticationSmm driver in UEFI firmware for some Intel(R) Server D50DNP Family products may allow a privileged user to enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-UEFI firmware for some Intel(R) Server D50DNP Family productsserver_system_d50tnp2mhsvac_firmware
CWE ID-CWE-20
Improper Input Validation
CVE-2024-22382
Assigner-Intel Corporation
ShareView Details
Assigner-Intel Corporation
CVSS Score-7.5||HIGH
EPSS-0.10% / 26.23%
||
7 Day CHG~0.00%
Published-16 May, 2024 | 20:46
Updated-15 Apr, 2026 | 00:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper input validation in PprRequestLog module in UEFI firmware for some Intel(R) Server D50DNP Family products may allow a privileged user to enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-PprRequestLog module in UEFI firmware for some Intel(R) Server D50DNP Family productsserver_system_d50tnp2mhsvac_firmware
CWE ID-CWE-20
Improper Input Validation
CVE-2024-22476
Assigner-Intel Corporation
ShareView Details
Assigner-Intel Corporation
CVSS Score-10||CRITICAL
EPSS-74.90% / 98.89%
||
7 Day CHG-2.58%
Published-16 May, 2024 | 20:46
Updated-15 Apr, 2026 | 00:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper input validation in some Intel(R) Neural Compressor software before version 2.5.0 may allow an unauthenticated user to potentially enable escalation of privilege via remote access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-Intel(R) Neural Compressor softwareneural_compressor_software
CWE ID-CWE-20
Improper Input Validation
CVE-2024-25079
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-7.4||HIGH
EPSS-0.11% / 29.13%
||
7 Day CHG~0.00%
Published-15 May, 2024 | 14:23
Updated-04 Aug, 2025 | 14:23
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A memory corruption vulnerability in HddPassword in Insyde InsydeH2O kernel 5.2 before 05.29.09, kernel 5.3 before 05.38.09, kernel 5.4 before 05.46.09, kernel 5.5 before 05.54.09, and kernel 5.6 before 05.61.09 could lead to escalating privileges in SMM.

Action-Not Available
Vendor-n/aInsyde Software Corp. (ISC)
Product-insydeh2on/ainsydeh2o
CWE ID-CWE-763
Release of Invalid Pointer or Reference
CVE-2024-25078
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-7.4||HIGH
EPSS-0.11% / 29.13%
||
7 Day CHG~0.00%
Published-15 May, 2024 | 14:11
Updated-29 Jul, 2025 | 20:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A memory corruption vulnerability in StorageSecurityCommandDxe in Insyde InsydeH2O before kernel 5.2: IB19130163 in 05.29.07, kernel 5.3: IB19130163 in 05.38.07, kernel 5.4: IB19130163 in 05.46.07, kernel 5.5: IB19130163 in 05.54.07, and kernel 5.6: IB19130163 in 05.61.07 could lead to escalating privileges in SMM.

Action-Not Available
Vendor-n/aInsyde Software Corp. (ISC)
Product-kerneln/ainsydeh2o
CWE ID-CWE-822
Untrusted Pointer Dereference
CVE-2024-23105
Assigner-Fortinet, Inc.
ShareView Details
Assigner-Fortinet, Inc.
CVSS Score-7.1||HIGH
EPSS-0.08% / 24.18%
||
7 Day CHG~0.00%
Published-14 May, 2024 | 16:19
Updated-01 Aug, 2024 | 22:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A Use Of Less Trusted Source [CWE-348] vulnerability in Fortinet FortiPortal version 7.0.0 through 7.0.6 and version 7.2.0 through 7.2.1 allows an unauthenticated attack to bypass IP protection through crafted HTTP or HTTPS packets.

Action-Not Available
Vendor-Fortinet, Inc.
Product-fortiportalFortiPortalfortiportal
CWE ID-CWE-348
Use of Less Trusted Source
  • Previous
  • 1
  • 2
  • 3
  • ...
  • 11
  • 12
  • Next