Discover Vulnerabilities Now!

Vulnerabilities
---
Vendors
---
Products
---
Vulnerability Media Exposure
These listed vulnerabilities have been referenced across multiple public sources, indicating high media attention and potential significance.
CVE-2024-5910
Severity
CRITICAL

Missing authentication for a critical function in Palo Alto Networks Expedition can lead to an Expedition admin account takeover for attackers with network access to Expedition. Note: Expedition is a tool aiding in configuration migration, tuning, and enrichment. Configuration secrets, credentials, and other data imported into Expedition is at risk due to this issue.

paloaltonetworks:expedition
CVE-2024-43451
Severity
MEDIUM

NTLM Hash Disclosure Spoofing Vulnerability

microsoft:windows_10_1507
microsoft:windows_10_1607
microsoft:windows_10_1809
microsoft:windows_10_21h2
microsoft:windows_10_22h2
microsoft:windows_11_22h2
microsoft:windows_11_23h2
microsoft:windows_11_24h2
microsoft:windows_server_2008
microsoft:windows_server_2012
microsoft:windows_server_2016
microsoft:windows_server_2019
microsoft:windows_server_2022
microsoft:windows_server_2022_23h2
microsoft:windows_server_2025
CVE-2024-9465
Severity
CRITICAL

An SQL injection vulnerability in Palo Alto Networks Expedition allows an unauthenticated attacker to reveal Expedition database contents, such as password hashes, usernames, device configurations, and device API keys. With this, attackers can also create and read arbitrary files on the Expedition system.

paloaltonetworks:expedition
CVE-2024-9463
Severity
HIGH

An OS command injection vulnerability in Palo Alto Networks Expedition allows an unauthenticated attacker to run arbitrary OS commands as root in Expedition, resulting in disclosure of usernames, cleartext passwords, device configurations, and device API keys of PAN-OS firewalls.

paloaltonetworks:expedition
CVE-2024-49039
Severity
HIGH

Windows Task Scheduler Elevation of Privilege Vulnerability

microsoft:windows_10_1507
microsoft:windows_10_1607
microsoft:windows_10_1809
microsoft:windows_10_21h2
microsoft:windows_10_22h2
microsoft:windows_11_22h2
microsoft:windows_11_23h2
microsoft:windows_11_24h2
microsoft:windows_server_2016
microsoft:windows_server_2019
microsoft:windows_server_2022
microsoft:windows_server_2022_23h2
microsoft:windows_server_2025
Newly recorded security issues per week
Stay up to date! New information is added to our knowledge database every day. Here you can see the history of newly added vulnerabilities that have been added to our CVE DB in recent years.
Vulnerabilities by severity (over the last 7 days)
Information about the vulnerabilities of the last 7 days can be found here. As you can see, critical vulnerabilities are also added on a daily basis. Therefore, validate your current security situation sets on a daily basis to ensure the security of your IT.
CVSS Score Distribution
The CVSS score rates security vulnerabilities from 0 to 10, based on factors like attack vectors and impacts on confidentiality, integrity, and availability.
EPSS Score Distribution
The EPSS score predicts the likelihood of a known vulnerability being exploited, complementing CVSS by assessing real-world exploitability based on threat activity and exploit availability.