Threat and Vulnerability Intelligence Database

RSS Feed

Example Searches:

CVE-2024-20653

Description: Microsoft Common Log File System Elevation of Privilege Vulnerability

CVSS: HIGH (7.8)

EPSS Score: 0.05%

Source: CVE
January 1st, 2025 (5 months ago)

CVE-2024-20652

Description: Windows HTML Platforms Security Feature Bypass Vulnerability

CVSS: HIGH (8.1)

EPSS Score: 0.05%

Source: CVE
January 1st, 2025 (5 months ago)

CVE-2024-0057

Description: NET, .NET Framework, and Visual Studio Security Feature Bypass Vulnerability

CVSS: CRITICAL (9.1)

EPSS Score: 0.15%

Source: CVE
January 1st, 2025 (5 months ago)

CVE-2024-0056

Description: Microsoft.Data.SqlClient and System.Data.SqlClient SQL Data Provider Security Feature Bypass Vulnerability

CVSS: HIGH (8.7)

EPSS Score: 0.05%

Source: CVE
January 1st, 2025 (5 months ago)
Description: Cybersecurity researchers have uncovered three security weaknesses in Microsoft's Azure Data Factory Apache Airflow integration that, if successfully exploited, could have allowed an attacker to gain the ability to conduct various covert actions, including data exfiltration and malware deployment. "Exploiting these flaws could allow attackers to gain persistent access as shadow administrators
Source: TheHackerNews
December 31st, 2024 (5 months ago)
Description: Microsoft is forcing .NET developers to quickly update their apps and developer pipelines so they do not use 'azureedge.net' domains to install .NET components, as the domain will soon be unavailable due to the bankruptcy and imminent shutdown of CDN provider Edgio. [...]
Source: BleepingComputer
December 30th, 2024 (5 months ago)

CVE-2024-53224

Description: In the Linux kernel, the following vulnerability has been resolved: RDMA/mlx5: Move events notifier registration to be after device registration Move pkey change work initialization and cleanup from device resources stage to notifier stage, since this is the stage which handles this work events. Fix a race between the device deregistration and pkey change work by moving MLX5_IB_STAGE_DEVICE_NOTIFIER to be after MLX5_IB_STAGE_IB_REG in order to ensure that the notifier is deregistered before the device during cleanup. Which ensures there are no works that are being executed after the device has already unregistered which can cause the panic below. BUG: kernel NULL pointer dereference, address: 0000000000000000 PGD 0 P4D 0 Oops: 0000 [#1] PREEMPT SMP PTI CPU: 1 PID: 630071 Comm: kworker/1:2 Kdump: loaded Tainted: G W OE --------- --- 5.14.0-162.6.1.el9_1.x86_64 #1 Hardware name: Microsoft Corporation Virtual Machine/Virtual Machine, BIOS 090008 02/27/2023 Workqueue: events pkey_change_handler [mlx5_ib] RIP: 0010:setup_qp+0x38/0x1f0 [mlx5_ib] Code: ee 41 54 45 31 e4 55 89 f5 53 48 89 fb 48 83 ec 20 8b 77 08 65 48 8b 04 25 28 00 00 00 48 89 44 24 18 48 8b 07 48 8d 4c 24 16 <4c> 8b 38 49 8b 87 80 0b 00 00 4c 89 ff 48 8b 80 08 05 00 00 8b 40 RSP: 0018:ffffbcc54068be20 EFLAGS: 00010282 RAX: 0000000000000000 RBX: ffff954054494128 RCX: ffffbcc54068be36 RDX: ffff954004934000 RSI: 0000000000000001 RDI: ffff954054494128 RBP: 0000000000000023 R08: ffff954001be2c20 R09: 000000000000...

EPSS Score: 0.04%

Source: CVE
December 28th, 2024 (5 months ago)

CVE-2024-43615

Description: Microsoft OpenSSH for Windows Remote Code Execution Vulnerability

CVSS: HIGH (7.1)

EPSS Score: 0.04%

Source: CVE
December 28th, 2024 (5 months ago)

CVE-2024-43614

Description: Microsoft Defender for Endpoint for Linux Spoofing Vulnerability

CVSS: MEDIUM (5.5)

EPSS Score: 0.05%

Source: CVE
December 28th, 2024 (5 months ago)

CVE-2024-43612

Description: Power BI Report Server Spoofing Vulnerability

CVSS: MEDIUM (6.9)

EPSS Score: 0.07%

Source: CVE
December 28th, 2024 (5 months ago)