Search Results (Refine Search)
Vuln ID | Summary | CVSS Severity |
---|---|---|
CVE-2024-21319 |
Microsoft Identity Denial of service vulnerability Published: January 09, 2024; 2:15:12 PM -0500 |
V4.0:(not available) V3.1: 6.8 MEDIUM V2.0:(not available) |
CVE-2024-0341 |
A vulnerability was found in Inis up to 2.0.1. It has been rated as problematic. This issue affects some unknown processing of the file /app/api/controller/default/File.php of the component GET Request Handler. The manipulation of the argument path leads to path traversal: '../filedir'. The exploit has been disclosed to the public and may be used. The identifier VDB-250109 was assigned to this vulnerability. Published: January 09, 2024; 2:15:11 PM -0500 |
V4.0:(not available) V3.1: 7.5 HIGH V2.0:(not available) |
CVE-2024-21325 |
Microsoft Printer Metadata Troubleshooter Tool Remote Code Execution Vulnerability Published: January 09, 2024; 1:15:56 PM -0500 |
V4.0:(not available) V3.1: 7.8 HIGH V2.0:(not available) |
CVE-2024-21320 |
Windows Themes Spoofing Vulnerability Published: January 09, 2024; 1:15:56 PM -0500 |
V4.0:(not available) V3.1: 6.5 MEDIUM V2.0:(not available) |
CVE-2024-21318 |
Microsoft SharePoint Server Remote Code Execution Vulnerability Published: January 09, 2024; 1:15:55 PM -0500 |
V4.0:(not available) V3.1: 8.8 HIGH V2.0:(not available) |
CVE-2024-21316 |
Windows Server Key Distribution Service Security Feature Bypass Published: January 09, 2024; 1:15:55 PM -0500 |
V4.0:(not available) V3.1: 6.1 MEDIUM V2.0:(not available) |
CVE-2024-21314 |
Microsoft Message Queuing Information Disclosure Vulnerability Published: January 09, 2024; 1:15:55 PM -0500 |
V4.0:(not available) V3.1: 6.5 MEDIUM V2.0:(not available) |
CVE-2024-21313 |
Windows TCP/IP Information Disclosure Vulnerability Published: January 09, 2024; 1:15:55 PM -0500 |
V4.0:(not available) V3.1: 5.3 MEDIUM V2.0:(not available) |
CVE-2024-21312 |
.NET Framework Denial of Service Vulnerability Published: January 09, 2024; 1:15:55 PM -0500 |
V4.0:(not available) V3.1: 7.5 HIGH V2.0:(not available) |
CVE-2024-21311 |
Windows Cryptographic Services Information Disclosure Vulnerability Published: January 09, 2024; 1:15:54 PM -0500 |
V4.0:(not available) V3.1: 5.5 MEDIUM V2.0:(not available) |
CVE-2024-21310 |
Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability Published: January 09, 2024; 1:15:54 PM -0500 |
V4.0:(not available) V3.1: 7.8 HIGH V2.0:(not available) |
CVE-2024-21309 |
Windows Kernel-Mode Driver Elevation of Privilege Vulnerability Published: January 09, 2024; 1:15:54 PM -0500 |
V4.0:(not available) V3.1: 7.8 HIGH V2.0:(not available) |
CVE-2024-21307 |
Remote Desktop Client Remote Code Execution Vulnerability Published: January 09, 2024; 1:15:54 PM -0500 |
V4.0:(not available) V3.1: 7.5 HIGH V2.0:(not available) |
CVE-2024-21306 |
Microsoft Bluetooth Driver Spoofing Vulnerability Published: January 09, 2024; 1:15:54 PM -0500 |
V4.0:(not available) V3.1: 5.7 MEDIUM V2.0:(not available) |
CVE-2024-21305 |
Hypervisor-Protected Code Integrity (HVCI) Security Feature Bypass Vulnerability Published: January 09, 2024; 1:15:53 PM -0500 |
V4.0:(not available) V3.1: 4.4 MEDIUM V2.0:(not available) |
CVE-2024-20700 |
Windows Hyper-V Remote Code Execution Vulnerability Published: January 09, 2024; 1:15:53 PM -0500 |
V4.0:(not available) V3.1: 7.5 HIGH V2.0:(not available) |
CVE-2024-20699 |
Windows Hyper-V Denial of Service Vulnerability Published: January 09, 2024; 1:15:53 PM -0500 |
V4.0:(not available) V3.1: 5.5 MEDIUM V2.0:(not available) |
CVE-2024-20698 |
Windows Kernel Elevation of Privilege Vulnerability Published: January 09, 2024; 1:15:53 PM -0500 |
V4.0:(not available) V3.1: 7.8 HIGH V2.0:(not available) |
CVE-2024-20697 |
Windows Libarchive Remote Code Execution Vulnerability Published: January 09, 2024; 1:15:53 PM -0500 |
V4.0:(not available) V3.1: 7.3 HIGH V2.0:(not available) |
CVE-2024-20696 |
Windows Libarchive Remote Code Execution Vulnerability Published: January 09, 2024; 1:15:52 PM -0500 |
V4.0:(not available) V3.1: 7.3 HIGH V2.0:(not available) |