CVE-2024-43485 |
Description: .NET and Visual Studio Denial of Service Vulnerability
CVSS: HIGH (7.5) EPSS Score: 0.09%
December 9th, 2024 (4 months ago)
|
CVE-2024-43484 |
Description: .NET, .NET Framework, and Visual Studio Denial of Service Vulnerability
CVSS: HIGH (7.5) EPSS Score: 0.09%
December 9th, 2024 (4 months ago)
|
CVE-2024-43483 |
Description: .NET, .NET Framework, and Visual Studio Denial of Service Vulnerability
CVSS: HIGH (7.5) EPSS Score: 0.09%
December 9th, 2024 (4 months ago)
|
CVE-2024-43453 |
Description: Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
CVSS: HIGH (8.8) EPSS Score: 0.09%
December 9th, 2024 (4 months ago)
|
CVE-2024-30092 |
Description: Windows Hyper-V Remote Code Execution Vulnerability
CVSS: HIGH (8.0) EPSS Score: 0.05%
December 9th, 2024 (4 months ago)
|
CVE-2024-20659 |
Description: Windows Hyper-V Security Feature Bypass Vulnerability
CVSS: HIGH (7.1) EPSS Score: 0.05%
December 9th, 2024 (4 months ago)
|
CVE-2024-12343 |
Description: A vulnerability classified as critical has been found in TP-Link VN020 F3v(T) TT_V6.2.1021. Affected is an unknown function of the file /control/WANIPConnection of the component SOAP Request Handler. The manipulation of the argument NewConnectionType leads to buffer overflow. The attack needs to be done within the local network. The exploit has been disclosed to the public and may be used. Es wurde eine kritische Schwachstelle in TP-Link VN020 F3v(T) TT_V6.2.1021 entdeckt. Es geht dabei um eine nicht klar definierte Funktion der Datei /control/WANIPConnection der Komponente SOAP Request Handler. Durch Manipulieren des Arguments NewConnectionType mit unbekannten Daten kann eine buffer overflow-Schwachstelle ausgenutzt werden. Der Angriff kann im lokalen Netzwerk passieren. Der Exploit steht zur öffentlichen Verfügung.
CVSS: HIGH (7.1) EPSS Score: 0.07%
December 9th, 2024 (4 months ago)
|
CVE-2024-12342 |
Description: A vulnerability was found in TP-Link VN020 F3v(T) TT_V6.2.1021. It has been rated as critical. This issue affects some unknown processing of the file /control/WANIPConnection of the component Incomplete SOAP Request Handler. The manipulation leads to denial of service. The attack can only be initiated within the local network. The exploit has been disclosed to the public and may be used. Eine Schwachstelle wurde in TP-Link VN020 F3v(T) TT_V6.2.1021 ausgemacht. Sie wurde als kritisch eingestuft. Es geht hierbei um eine nicht näher spezifizierte Funktion der Datei /control/WANIPConnection der Komponente Incomplete SOAP Request Handler. Durch das Manipulieren mit unbekannten Daten kann eine denial of service-Schwachstelle ausgenutzt werden. Der Angriff kann im lokalen Netzwerk angegangen werden. Der Exploit steht zur öffentlichen Verfügung.
CVSS: HIGH (7.1) EPSS Score: 0.05%
December 9th, 2024 (4 months ago)
|
CVE-2024-52564 |
Description: Inclusion of undocumented features or chicken bits issue exists in UD-LT1 firmware Ver.2.1.8 and earlier and UD-LT1/EX firmware Ver.2.1.8 and earlier. A remote attacker may disable the firewall function of the affected products. As a result, an arbitrary OS command may be executed and/or configuration settings of the device may be altered.
CVSS: HIGH (7.5) EPSS Score: 0.04%
December 8th, 2024 (4 months ago)
|
CVE-2024-47115 |
Description: IBM AIX 7.2, 7.3 and VIOS 3.1 and 4.1 could allow a local user to execute arbitrary commands on the system due to improper neutralization of input.
CVSS: HIGH (7.8) EPSS Score: 0.04%
December 8th, 2024 (4 months ago)
|