Threat and Vulnerability Intelligence Database

RSS Feed

Example Searches:

CVE-2024-30081

Description: Windows NTLM Spoofing Vulnerability

CVSS: HIGH (7.1)

EPSS Score: 0.35%

Source: CVE
December 11th, 2024 (5 months ago)

CVE-2024-30079

Description: Windows Remote Access Connection Manager Elevation of Privilege Vulnerability

CVSS: HIGH (7.8)

EPSS Score: 0.05%

Source: CVE
December 11th, 2024 (5 months ago)

CVE-2024-30071

Description: Windows Remote Access Connection Manager Information Disclosure Vulnerability

CVSS: MEDIUM (4.7)

EPSS Score: 0.05%

Source: CVE
December 11th, 2024 (5 months ago)

CVE-2024-30061

Description: Microsoft Dynamics 365 (On-Premises) Information Disclosure Vulnerability

CVSS: HIGH (7.3)

EPSS Score: 0.05%

Source: CVE
December 11th, 2024 (5 months ago)

CVE-2024-29945

Description: In Splunk Enterprise versions below 9.2.1, 9.1.4, and 9.0.9, the software potentially exposes authentication tokens during the token validation process. This exposure happens when either Splunk Enterprise runs in debug mode or the JsonWebToken component has been configured to log its activity at the DEBUG logging level.

CVSS: HIGH (7.2)

EPSS Score: 0.05%

Source: CVE
December 11th, 2024 (5 months ago)

CVE-2024-28928

Description: SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability

CVSS: HIGH (8.8)

EPSS Score: 0.05%

Source: CVE
December 11th, 2024 (5 months ago)

CVE-2024-28899

Description: Secure Boot Security Feature Bypass Vulnerability

CVSS: HIGH (8.8)

EPSS Score: 0.05%

Source: CVE
December 11th, 2024 (5 months ago)

CVE-2024-28166

Description: SAP BusinessObjects Business Intelligence Platform allows an authenticated attacker to upload malicious code over the network, that could be executed by the application. On successful exploitation, the attacker can cause a low impact on the Integrity of the application.

CVSS: LOW (3.7)

EPSS Score: 0.05%

Source: CVE
December 11th, 2024 (5 months ago)

CVE-2024-28138

Description: An unauthenticated attacker with network access to the affected device's web interface can execute any system command via the "msg_events.php" script as the www-data user. The HTTP GET parameter "data" is not properly sanitized.

CVSS: LOW (0.0)

EPSS Score: 0.04%

Source: CVE
December 11th, 2024 (5 months ago)

CVE-2024-28038

Description: The web interface of the affected devices processes a cookie value improperly, leading to a stack buffer overflow. More precisely, giving too long character string to MFPSESSIONID parameter results in a stack buffer overflow. As for the details of affected product names, model numbers, and versions, refer to the information provided by the respective vendors listed under [References].

CVSS: CRITICAL (9.0)

EPSS Score: 0.04%

Source: CVE
December 11th, 2024 (5 months ago)