CWE:
 

Sorry. No results for Bugtraq WLB2


CVEMAP Search Results

CVE
Details
Description
2024-10-08
Waiting for details
CVE-2024-43502

Updating...
 

 
Windows Kernel Elevation of Privilege Vulnerability

 
2024-09-10
Waiting for details
CVE-2024-38254

Updating...
 

 
Windows Authentication Information Disclosure Vulnerability

 
Waiting for details
CVE-2024-38256

Updating...
 

 
Windows Kernel-Mode Driver Information Disclosure Vulnerability

 
Waiting for details
CVE-2024-38257

Updating...
 

 
Microsoft AllJoyn API Information Disclosure Vulnerability

 
Waiting for details
CVE-2024-38260

Updating...
 

 
Windows Remote Desktop Licensing Service Remote Code Execution Vulnerability

 
Waiting for details
CVE-2024-43458

Updating...
 

 
Windows Networking Information Disclosure Vulnerability

 
2024-08-13
Waiting for details
CVE-2024-38118

Updating...
 

 
Microsoft Local Security Authority (LSA) Server Information Disclosure Vulnerability

 
Waiting for details
CVE-2024-38122

Updating...
 

 
Microsoft Local Security Authority (LSA) Server Information Disclosure Vulnerability

 
2024-01-09
Waiting for details
CVE-2023-42797

Updating...
 

 
A vulnerability has been identified in CP-8031 MASTER MODULE (All versions < CPCI85 V05.20), CP-8050 MASTER MODULE (All versions < CPCI85 V05.20). The network configuration service of affected devices contains a flaw in the conversion of ipv4 addresses that could lead to an uninitialized variable being used in succeeding validation steps. By uploading specially crafted network configuration, an authenticated remote attacker could be able to inject commands that are executed on the device with root privileges during device startup.

 
2023-07-14
Waiting for details
CVE-2023-36836

Updating...
 

 
A Use of an Uninitialized Resource vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows a local, authenticated attacker with low privileges to cause a Denial of Service (DoS). On all Junos OS and Junos OS Evolved platforms, in a Multicast only Fast Reroute (MoFRR) scenario, the rpd process can crash when a a specific low privileged CLI command is executed. The rpd crash will impact all routing protocols until the process has automatically been restarted. As the operational state which makes this issue exploitable is outside the attackers control, this issue is considered difficult to exploit. Continued execution of this command will lead to a sustained DoS. This issue affects: Juniper Networks Junos OS 19.4 version 19.4R3-S5 and later versions prior to 19.4R3-S9; 20.1 version 20.1R2 and later versions; 20.2 versions prior to 20.2R3-S7; 20.3 versions prior to 20.3R3-S5; 20.4 versions prior to 20.4R3-S6; 21.1 versions prior to 21.1R3-S4; 21.2 versions prior to 21.2R3-S2; 21.3 versions prior to 21.3R3-S1; 21.4 versions prior to 21.4R3; 22.1 versions prior to 22.1R1-S2, 22.1R2; 22.2 versions prior to 22.2R2. Juniper Networks Junos OS Evolved All versions prior to 20.4R3-S6-EVO; 21.1-EVO version 21.1R1-EVO and later versions; 21.2-EVO version 21.2R1-EVO and later versions; 21.3-EVO versions prior to 21.3R3-S1-EVO; 21.4-EVO versions prior to 21.4R3-EVO; 22.1-EVO versions prior to 22.1R1-S2-EVO, 22.1R2-EVO; 22.2-EVO versions prior to 22.2R2-EVO.

 

 


Copyright 2024, cxsecurity.com

 

Back to Top