cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2024-1212,https://securityvulnerability.io/vulnerability/CVE-2024-1212,Remote Attackers Can Execute Arbitrary System Commands via LoadMaster Management Interface,"The LoadMaster management interface in Kemp Technologies products has a vulnerability that allows unauthenticated remote attackers to gain access. This weakness can be exploited to execute arbitrary system commands, potentially compromising the integrity and security of the affected systems. Organizations using LoadMaster are advised to apply the necessary security updates to mitigate the risk associated with this vulnerability.",Progress Software,Loadmaster,9.8,CRITICAL,0.9371399879455566,true,2024-11-18T00:00:00.000Z,true,false,true,2024-03-20T07:23:18.000Z,true,true,true,2024-03-22T21:52:02.316Z,2024-02-21T17:39:12.599Z,6881 CVE-2024-4358,https://securityvulnerability.io/vulnerability/CVE-2024-4358,Unauthenticated Attacker Can Gain Access to Restricted Functionality via Authentication Bypass Vulnerability in Telerik Report Server,"An authentication bypass vulnerability exists in Progress Telerik Report Server, specifically in versions prior to 2024 Q1 (10.0.24.305) deployed on IIS. This issue permits unauthenticated attackers to access restricted features of the Telerik Report Server, compromising the security and privacy of sensitive data. Attackers exploiting this vulnerability can perform unauthorized actions that should otherwise be restricted to authenticated users, significantly undermining the integrity of the server's operations.",Progress Software,Telerik Report Server,9.8,CRITICAL,0.9252700209617615,true,2024-06-13T00:00:00.000Z,true,true,true,2024-05-30T13:31:18.000Z,true,true,true,2024-06-08T19:52:02.296Z,2024-05-29T14:51:21.612Z,13759 CVE-2024-4885,https://securityvulnerability.io/vulnerability/CVE-2024-4885,Unauthenticated Remote Code Execution Vulnerability in Progress WhatsUpGold,"An unauthenticated Remote Code Execution vulnerability exists in versions of Progress WhatsUp Gold released before 2023.1.3. This vulnerability allows an attacker to execute arbitrary commands with iisapppool\nmconsole privileges through the WhatsUp.ExportUtilities.Export.GetFileWithoutZip function, potentially compromising network security and monitoring capabilities.",Progress Software,Whatsup Gold,9.8,CRITICAL,0.047940000891685486,false,,true,false,true,2024-07-09T09:35:19.000Z,,true,false,,2024-06-25T19:48:15.268Z,4608 CVE-2024-6327,https://securityvulnerability.io/vulnerability/CVE-2024-6327,Remote Code Execution Vulnerability in Telerik Report Server,"In Progress Telerik Report Server, a vulnerability exists due to insecure deserialization processes, allowing attackers to potentially execute arbitrary code remotely. This issue affects versions released prior to 2024 Q2 (10.1.24.709), which may enable malicious users to manipulate serialized data, leading to unauthorized actions and system compromise. Organizations utilizing this software are advised to update to the latest version to mitigate the risks associated with this vulnerability.",Progress Software,Telerik Report Server,9.8,CRITICAL,0.0007099999929778278,false,,true,false,true,2024-07-25T20:27:07.000Z,,true,false,,2024-07-24T13:57:07.165Z,6110