Threat and Vulnerability Intelligence Database

RSS Feed

Example Searches:

CVE-2024-43485

Description: .NET and Visual Studio Denial of Service Vulnerability

CVSS: HIGH (7.5)

EPSS Score: 0.09%

Source: CVE
December 9th, 2024 (4 months ago)

CVE-2024-43484

Description: .NET, .NET Framework, and Visual Studio Denial of Service Vulnerability

CVSS: HIGH (7.5)

EPSS Score: 0.09%

Source: CVE
December 9th, 2024 (4 months ago)

CVE-2024-43483

Description: .NET, .NET Framework, and Visual Studio Denial of Service Vulnerability

CVSS: HIGH (7.5)

EPSS Score: 0.09%

Source: CVE
December 9th, 2024 (4 months ago)

CVE-2024-43453

Description: Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability

CVSS: HIGH (8.8)

EPSS Score: 0.09%

Source: CVE
December 9th, 2024 (4 months ago)

CVE-2024-30092

Description: Windows Hyper-V Remote Code Execution Vulnerability

CVSS: HIGH (8.0)

EPSS Score: 0.05%

Source: CVE
December 9th, 2024 (4 months ago)

CVE-2024-20659

Description: Windows Hyper-V Security Feature Bypass Vulnerability

CVSS: HIGH (7.1)

EPSS Score: 0.05%

Source: CVE
December 9th, 2024 (4 months ago)

CVE-2024-12343

Description: A vulnerability classified as critical has been found in TP-Link VN020 F3v(T) TT_V6.2.1021. Affected is an unknown function of the file /control/WANIPConnection of the component SOAP Request Handler. The manipulation of the argument NewConnectionType leads to buffer overflow. The attack needs to be done within the local network. The exploit has been disclosed to the public and may be used. Es wurde eine kritische Schwachstelle in TP-Link VN020 F3v(T) TT_V6.2.1021 entdeckt. Es geht dabei um eine nicht klar definierte Funktion der Datei /control/WANIPConnection der Komponente SOAP Request Handler. Durch Manipulieren des Arguments NewConnectionType mit unbekannten Daten kann eine buffer overflow-Schwachstelle ausgenutzt werden. Der Angriff kann im lokalen Netzwerk passieren. Der Exploit steht zur öffentlichen Verfügung.

CVSS: HIGH (7.1)

EPSS Score: 0.07%

Source: CVE
December 9th, 2024 (4 months ago)

CVE-2024-12342

Description: A vulnerability was found in TP-Link VN020 F3v(T) TT_V6.2.1021. It has been rated as critical. This issue affects some unknown processing of the file /control/WANIPConnection of the component Incomplete SOAP Request Handler. The manipulation leads to denial of service. The attack can only be initiated within the local network. The exploit has been disclosed to the public and may be used. Eine Schwachstelle wurde in TP-Link VN020 F3v(T) TT_V6.2.1021 ausgemacht. Sie wurde als kritisch eingestuft. Es geht hierbei um eine nicht näher spezifizierte Funktion der Datei /control/WANIPConnection der Komponente Incomplete SOAP Request Handler. Durch das Manipulieren mit unbekannten Daten kann eine denial of service-Schwachstelle ausgenutzt werden. Der Angriff kann im lokalen Netzwerk angegangen werden. Der Exploit steht zur öffentlichen Verfügung.

CVSS: HIGH (7.1)

EPSS Score: 0.05%

Source: CVE
December 9th, 2024 (4 months ago)

CVE-2024-52564

Description: Inclusion of undocumented features or chicken bits issue exists in UD-LT1 firmware Ver.2.1.8 and earlier and UD-LT1/EX firmware Ver.2.1.8 and earlier. A remote attacker may disable the firewall function of the affected products. As a result, an arbitrary OS command may be executed and/or configuration settings of the device may be altered.

CVSS: HIGH (7.5)

EPSS Score: 0.04%

Source: CVE
December 8th, 2024 (4 months ago)

CVE-2024-47115

Description: IBM AIX 7.2, 7.3 and VIOS 3.1 and 4.1 could allow a local user to execute arbitrary commands on the system due to improper neutralization of input.

CVSS: HIGH (7.8)

EPSS Score: 0.04%

Source: CVE
December 8th, 2024 (4 months ago)