Show filters
3,390 Total Results
Displaying 251-260 of 3,390
Sort by:
Attacker Value
Unknown

CVE-2024-37969

Disclosure Date: July 09, 2024 (last updated July 17, 2024)
Secure Boot Security Feature Bypass Vulnerability
Attacker Value
Unknown

CVE-2024-35270

Disclosure Date: July 09, 2024 (last updated July 18, 2024)
Windows iSCSI Service Denial of Service Vulnerability
Attacker Value
Unknown

CVE-2024-28899

Disclosure Date: July 09, 2024 (last updated July 18, 2024)
Secure Boot Security Feature Bypass Vulnerability
Attacker Value
Unknown

CVE-2024-26184

Disclosure Date: July 09, 2024 (last updated July 18, 2024)
Secure Boot Security Feature Bypass Vulnerability
Attacker Value
Unknown

CVE-2024-26015

Disclosure Date: July 09, 2024 (last updated September 10, 2024)
An incorrect parsing of numbers with different radices vulnerability [CWE-1389] in FortiProxy version 7.4.3 and below, version 7.2.10 and below, version 7.0.17 and below and FortiOS version 7.4.3 and below, version 7.2.8 and below, version 7.0.15 and below IP address validation feature may permit an unauthenticated attacker to bypass the IP blocklist via crafted requests.
Attacker Value
Unknown

CVE-2024-20890

Disclosure Date: July 02, 2024 (last updated July 06, 2024)
Improper input validation in BLE prior to SMR Jul-2024 Release 1 allows adjacent attackers to trigger abnormal behavior.
Attacker Value
Unknown

CVE-2024-20889

Disclosure Date: July 02, 2024 (last updated July 06, 2024)
Improper authentication in BLE prior to SMR Jul-2024 Release 1 allows adjacent attackers to pair with devices.
Attacker Value
Unknown

CVE-2024-25031

Disclosure Date: June 28, 2024 (last updated August 02, 2024)
IBM Storage Defender - Resiliency Service 2.0.0 through 2.0.4 uses an inadequate account lockout setting that could allow an attacker on the network to brute force account credentials. IBM X-Force ID: 281678.
Attacker Value
Unknown

CVE-2024-38272

Disclosure Date: June 26, 2024 (last updated September 25, 2024)
There exists a vulnerability in Quick Share/Nearby, where an attacker can bypass the accept file dialog on Quick Share Windows. Normally in Quick Share Windows app we can't send a file without the user accept from the receiving device if the visibility is set to everyone mode or contacts mode. We recommend upgrading to version 1.0.1724.0 of Quick Share or above
Attacker Value
Unknown

CVE-2024-38271

Disclosure Date: June 26, 2024 (last updated September 25, 2024)
There exists a vulnerability in Quick Share/Nearby, where an attacker can force a victim to stay connected to a temporary hotspot created for the sharing. As part of the sequence of packets in a Quick Share connection over Bluetooth, the attacker forces the victim to connect to the attacker’s WiFi network and then sends an OfflineFrame that crashes Quick Share. This makes the Wifi connection to the attacker’s network last, instead of returning to the old network when the Quick Share session completes, allowing the attacker to be a MiTM. We recommend upgrading to version 1.0.1724.0 of Quick Share or above