CVE-2025-0108 |
🚨 Marked as known exploited on February 14th, 2025 (5 months ago).
Description: An authentication bypass in the Palo Alto Networks PAN-OS software enables an unauthenticated attacker with network access to the management web interface to bypass the authentication otherwise required by the PAN-OS management web interface and invoke certain PHP scripts. While invoking these PHP scripts does not enable remote code execution, it can negatively impact integrity and confidentiality of PAN-OS.
You can greatly reduce the risk of this issue by restricting access to the management web interface to only trusted internal IP addresses according to our recommended best practices deployment guidelines https://live.paloaltonetworks.com/t5/community-blogs/tips-amp-tricks-how-to-secure-the-management-access-of-your-palo/ba-p/464431 .
This issue does not affect Cloud NGFW or Prisma Access software.
CVSS: HIGH (8.8) EPSS Score: 96.76%
February 13th, 2025 (5 months ago)
|
CVE-2024-41710 |
🚨 Marked as known exploited on January 30th, 2025 (6 months ago).
Description: A vulnerability in the Mitel 6800 Series, 6900 Series, and 6900w Series SIP Phones, including the 6970 Conference Unit, through R6.4.0.HF1 (R6.4.0.136) could allow an authenticated attacker with administrative privilege to conduct an argument injection attack, due to insufficient parameter sanitization during the boot process. A successful exploit could allow an attacker to execute arbitrary commands within the context of the system.
CVSS: HIGH (7.2) EPSS Score: 1.18%
February 13th, 2025 (5 months ago)
|
CVE-2024-41168 |
Description: Use after free in some Intel(R) PROSet/Wireless WiFi and Killerâ„¢ WiFi software for Windows before version 23.80 may allow an unauthenticated user to potentially enable denial of service via adjacent access.
CVSS: HIGH (7.1) EPSS Score: 0.04%
February 13th, 2025 (5 months ago)
|
CVE-2024-39805 |
Description: Insufficient verification of data authenticity in some Intel(R) DSA software before version 23.4.39 may allow an authenticated user to potentially enable escalation of privilege via local access.
CVSS: HIGH (7.3) EPSS Score: 0.04%
February 13th, 2025 (5 months ago)
|
CVE-2024-39356 |
Description: NULL pointer dereference in some Intel(R) PROSet/Wireless WiFi and Killerâ„¢ WiFi software for Windows before version 23.80 may allow an unauthenticated user to potentially enable denial of service via adjacent access.
CVSS: HIGH (7.1) EPSS Score: 0.04%
February 13th, 2025 (5 months ago)
|
CVE-2024-38307 |
Description: Improper input validation in the firmware for some Intel(R) AMT and Intel(R) Standard Manageability may allow an authenticated user to potentially enable denial of service via network access.
CVSS: HIGH (7.1) EPSS Score: 0.04%
February 13th, 2025 (5 months ago)
|
CVE-2024-37355 |
Description: Improper access control in some Intel(R) Graphics software may allow an authenticated user to potentially enable escalation of privilege via local access.
CVSS: HIGH (8.5) EPSS Score: 0.04%
February 13th, 2025 (5 months ago)
|
CVE-2024-36274 |
Description: Out-of-bounds write in the Intel(R) 800 Series Ethernet Driver for Intel(R) Ethernet Adapter Complete Driver Pack before versions 29.1 may allow an unauthenticated user to potentially enable denial of service via adjacent access.
CVSS: HIGH (7.1) EPSS Score: 0.04%
February 13th, 2025 (5 months ago)
|
CVE-2024-36262 |
Description: Race condition in some Intel(R) System Security Report and System Resources Defense firmware may allow a privileged user to potentially enable escalation of privilege via local access.
CVSS: HIGH (8.6) EPSS Score: 0.04%
February 13th, 2025 (5 months ago)
|
CVE-2024-34579 |
Description: Fuji Electric Alpha5 SMART
is vulnerable to a stack-based buffer overflow, which may allow an attacker to execute arbitrary code.
CVSS: HIGH (7.8) EPSS Score: 0.07%
February 13th, 2025 (5 months ago)
|