5.3

CVSS3.1

CVE-2024-52615 - Avahi: avahi wide-area dns uses constant source port

A flaw was found in Avahi-daemon, which relies on fixed source ports for wide-area DNS queries. This issue simplifies attacks where malicious DNS responses are injected.

๐Ÿ“… Published: Nov. 15, 2024, midnight ๐Ÿ”„ Last Modified: April 15, 2026, 12:35 a.m.

7.8

CVSS3.1

CVE-2024-46465 -

By default, dedicated folders of CRYHOD for Windows up to 2024.3 can be accessed by other users to misuse technical files and make them perform tasks with higher privileges. Configuration of CRYHOD has to be modified to prevent this vulnerability.

๐Ÿ“… Published: Nov. 15, 2024, midnight ๐Ÿ”„ Last Modified: Oct. 1, 2025, 6:12 p.m.

7.5

CVSS3.1

CVE-2024-50650 -

python_book V1.0 is vulnerable to Incorrect Access Control, which allows attackers to obtain sensitive information of users with different IDs by modifying the ID parameter.

๐Ÿ“… Published: Nov. 15, 2024, midnight ๐Ÿ”„ Last Modified: June 17, 2025, 1:10 a.m.

6.5

CVSS3.1

CVE-2024-24425 -

Magma v1.8.0 and OAI EPC Federation v1.20 were discovered to contain an out-of-bounds read in the amf_as_establish_req function at /tasks/amf/amf_as.cpp. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted NAS packet.

๐Ÿ“… Published: Nov. 15, 2024, midnight ๐Ÿ”„ Last Modified: April 15, 2026, 12:35 a.m.

5.9

CVSS3.1

CVE-2024-24459 -

An invalid memory access when handling the ProtocolIE_ID field ofย S1Setup Request messages in Athonet vEPC MME v11.4.0 allowsย attackers to cause a Denial of Service (DoS) to the cellular network byย repeatedly initiating connections and sending a crafted payload.

๐Ÿ“… Published: Nov. 15, 2024, midnight ๐Ÿ”„ Last Modified: April 15, 2026, 12:35 a.m.

8.8

CVSS3.1

CVE-2024-44625 -

Gogs <=0.13.0 is vulnerable to Directory Traversal via the editFilePost function of internal/route/repo/editor.go.

๐Ÿ“… Published: Nov. 15, 2024, midnight ๐Ÿ”„ Last Modified: Nov. 21, 2024, 9:36 a.m.

8

CVSS3.1

CVE-2024-52308 - Connecting to a malicious Codespaces via GH CLI could allow command execution on the user's computer

The GitHub CLI version 2.6.1 and earlier are vulnerable to remote code execution through a malicious codespace SSH server when using `gh codespace ssh` or `gh codespace logs` commands. This has been patched in the cli v2.62.0. Developers connect to remote codespaces through an SSH server running wโ€ฆ

๐Ÿ“… Published: Nov. 14, 2024, 10:55 p.m. ๐Ÿ”„ Last Modified: Nov. 20, 2024, 3:07 p.m.

5.5

CVSS3.1

CVE-2017-13227 -

In the autofill service, the package name that is provided by the app process is trusted inappropriately. ย This could lead to information disclosure with no additional execution privileges needed. ย User interaction is not needed for exploitation.

๐Ÿ“… Published: Nov. 14, 2024, 10:10 p.m. ๐Ÿ”„ Last Modified: Nov. 20, 2024, 5:35 p.m.

10

CVSS3.1

CVE-2024-48967 - Life2000 ventilator and Service PC lack sufficient audit logging capabilities

The ventilator and the Service PC lack sufficient audit logging capabilities to allow for detection of malicious activity and subsequent forensic examination. An attacker with access to the ventilator and/or the Service PC could, without detection, make unauthorized changes to ventilator settings tโ€ฆ

๐Ÿ“… Published: Nov. 14, 2024, 9:40 p.m. ๐Ÿ”„ Last Modified: April 15, 2026, 12:35 a.m.

10

CVSS3.1

CVE-2024-48966 - Life2000 service tools for test and calibration do not support user authentication

The software tools used by service personnel to test & calibrate the ventilator do not support user authentication. An attacker with access to the Service PC where the tools are installed could obtain diagnostic information through the test tool or manipulate the ventilator's settings and embedded โ€ฆ

๐Ÿ“… Published: Nov. 14, 2024, 9:38 p.m. ๐Ÿ”„ Last Modified: April 15, 2026, 12:35 a.m.
Total resulsts: 349182
Page 7871 of 34,919
ยซ previous page ยป next page
Filters