U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

NOTICE UPDATED - May, 29th 2024

The NVD has a new announcement page with status updates, news, and how to stay connected!


The NVD is the U.S. government repository of standards based vulnerability management data represented using the Security Content Automation Protocol (SCAP). This data enables automation of vulnerability management, security measurement, and compliance. The NVD includes databases of security checklist references, security-related software flaws, product names, and impact metrics.

For information on how to the cite the NVD, including the database's Digital Object Identifier (DOI), please consult NIST's Public Data Repository.

Last 20 Scored Vulnerability IDs & Summaries CVSS Severity
  • CVE-2024-21835 - Insecure inherited permissions in some Intel(R) XTU software before version 7.14.0.15 may allow an authenticated user to potentially enable escalation of privilege via local access.
    Published: May 16, 2024; 5:16:04 PM -0400

    V3.1: 7.8 HIGH

  • CVE-2024-4058 - Type confusion in ANGLE in Google Chrome prior to 124.0.6367.78 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Critical)
    Published: May 01, 2024; 9:15:52 AM -0400

    V3.1: 8.8 HIGH

  • CVE-2023-50026 - SQL injection vulnerability in Presta Monster "Multi Accessories Pro" (hsmultiaccessoriespro) module for PrestaShop versions 5.1.1 and before, allows remote attackers to escalate privileges and obtain sensitive information via the method HsAccesso... read CVE-2023-50026
    Published: February 09, 2024; 3:15:08 AM -0500

    V3.1: 9.8 CRITICAL

  • CVE-2023-6199 - Book Stack version 23.10.2 allows filtering local files on the server. This is possible because the application is vulnerable to SSRF.
    Published: November 20, 2023; 6:15:06 PM -0500

    V3.1: 6.5 MEDIUM

  • CVE-2023-33461 - iniparser v4.1 is vulnerable to NULL Pointer Dereference in function iniparser_getlongint which misses check NULL for function iniparser_getstring's return.
    Published: May 31, 2023; 11:15:20 PM -0400

    V3.1: 5.5 MEDIUM

  • CVE-2024-24393 - File Upload vulnerability index.php in Pichome v.1.1.01 allows a remote attacker to execute arbitrary code via crafted POST request.
    Published: February 08, 2024; 5:15:09 PM -0500

    V3.1: 9.8 CRITICAL

  • CVE-2019-18683 - An issue was discovered in drivers/media/platform/vivid in the Linux kernel through 5.3.8. It is exploitable for privilege escalation on some Linux distributions where local users have /dev/video0 access, but only if the driver happens to be loade... read CVE-2019-18683
    Published: November 04, 2019; 11:15:11 AM -0500

    V3.1: 7.0 HIGH
    V2.0: 6.9 MEDIUM

  • CVE-2024-1086 - A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation. The nft_verdict_init() function allows positive values as drop error within the hook verdict, and hence th... read CVE-2024-1086
    Published: January 31, 2024; 8:15:10 AM -0500

    V3.1: 7.8 HIGH

  • CVE-2017-3506 - Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent: Web Services). Supported versions that are affected are 10.3.6.0, 12.1.3.0, 12.2.1.0, 12.2.1.1 and 12.2.1.2. Difficult to exploit vulnerability allows... read CVE-2017-3506
    Published: April 24, 2017; 3:59:03 PM -0400

    V3.1: 7.4 HIGH
    V2.0: 5.8 MEDIUM

  • CVE-2021-3520 - There's a flaw in lz4. An attacker who submits a crafted file to an application linked with lz4 may be able to trigger an integer overflow, leading to calling of memmove() on a negative size argument, causing an out-of-bounds write and/or a crash.... read CVE-2021-3520
    Published: June 02, 2021; 9:15:13 AM -0400

    V3.1: 9.8 CRITICAL
    V2.0: 7.5 HIGH

  • CVE-2023-39114 - ngiflib commit 84a75 was discovered to contain a segmentation violation via the function SDL_LoadAnimatedGif at ngiflibSDL.c. This vulnerability is triggered when running the program SDLaffgif.
    Published: August 02, 2023; 7:15:10 PM -0400

    V3.1: 5.5 MEDIUM

  • CVE-2014-8159 - The InfiniBand (IB) implementation in the Linux kernel package before 2.6.32-504.12.2 on Red Hat Enterprise Linux (RHEL) 6 does not properly restrict use of User Verbs for registration of memory regions, which allows local users to access arbitrar... read CVE-2014-8159
    Published: March 16, 2015; 6:59:01 AM -0400

    V2.0: 6.9 MEDIUM

  • CVE-2014-3186 - Buffer overflow in the picolcd_raw_event function in devices/hid/hid-picolcd_core.c in the PicoLCD HID device driver in the Linux kernel through 3.16.3, as used in Android on Nexus 7 devices, allows physically proximate attackers to cause a denial... read CVE-2014-3186
    Published: September 28, 2014; 6:55:10 AM -0400

    V2.0: 6.9 MEDIUM

  • CVE-2022-47015 - MariaDB Server before 10.3.34 thru 10.9.3 is vulnerable to Denial of Service. It is possible for function spider_db_mbase::print_warnings to dereference a null pointer.
    Published: January 20, 2023; 2:15:17 PM -0500

    V3.1: 6.5 MEDIUM

  • CVE-2024-3378 - A vulnerability has been found in iboss Secure Web Gateway up to 10.1 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /login of the component Login Portal. The manipulation of the argument redi... read CVE-2024-3378
    Published: April 06, 2024; 9:15:12 AM -0400

    V3.1: 6.1 MEDIUM

  • CVE-2024-27316 - HTTP/2 incoming headers exceeding the limit are temporarily buffered in nghttp2 in order to generate an informative HTTP 413 response. If a client does not stop sending headers, this leads to memory exhaustion.
    Published: April 04, 2024; 4:15:08 PM -0400

    V3.1: 7.5 HIGH

  • CVE-2024-30889 - Cross Site Scripting vulnerability in audimex audimexEE v.15.1.2 and fixed in 15.1.3.9 allows a remote attacker to execute arbitrary code via the service, method, widget_type, request_id, payload parameters.
    Published: June 04, 2024; 6:15:10 PM -0400

    V3.1: 5.4 MEDIUM

  • CVE-2024-28999 - The SolarWinds Platform was determined to be affected by a Race Condition Vulnerability affecting the web console.
    Published: June 04, 2024; 11:15:45 AM -0400

    V3.1: 8.1 HIGH

  • CVE-2024-29004 - The SolarWinds Platform was determined to be affected by a stored cross-site scripting vulnerability affecting the web console. A high-privileged user and user interaction is required to exploit this vulnerability.
    Published: June 04, 2024; 11:15:45 AM -0400

    V3.1: 4.8 MEDIUM

  • CVE-2024-28996 - The SolarWinds Platform was determined to be affected by a SWQL Injection Vulnerability. Attack complexity is high for this vulnerability.  
    Published: June 04, 2024; 11:15:44 AM -0400

    V3.1: 8.1 HIGH

Created September 20, 2022 , Updated May 29, 2024