Vulnerabilities > Medium
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2024-07-09 | CVE-2024-38065 | Out-of-bounds Write vulnerability in Microsoft products Secure Boot Security Feature Bypass Vulnerability | 6.8 |
2024-07-09 | CVE-2024-38086 | Unspecified vulnerability in Microsoft Azure Kinect Software Development KIT Azure Kinect SDK Remote Code Execution Vulnerability high complexity microsoft | 6.4 |
2024-07-09 | CVE-2024-38099 | Unspecified vulnerability in Microsoft products Windows Remote Desktop Licensing Service Denial of Service Vulnerability | 5.9 |
2024-07-09 | CVE-2024-38101 | Unspecified vulnerability in Microsoft products Windows Layer-2 Bridge Network Driver Denial of Service Vulnerability low complexity microsoft | 6.5 |
2024-07-09 | CVE-2024-38102 | Unspecified vulnerability in Microsoft products Windows Layer-2 Bridge Network Driver Denial of Service Vulnerability low complexity microsoft | 6.5 |
2024-07-09 | CVE-2024-38105 | Unspecified vulnerability in Microsoft products Windows Layer-2 Bridge Network Driver Denial of Service Vulnerability low complexity microsoft | 6.5 |
2024-07-09 | CVE-2024-39118 | Unspecified vulnerability in Mommyheather Advanced Backups Mommy Heather Advanced Backups up to v3.5.3 allows attackers to write arbitrary files via restoring a crafted back up. | 5.5 |
2024-07-09 | CVE-2024-5652 | Unspecified vulnerability in Docker Desktop In Docker Desktop on Windows before v4.31.0 allows a user in the docker-users group to cause a Windows Denial-of-Service through the exec-path Docker daemon config option in Windows containers mode. | 5.5 |
2024-07-09 | CVE-2024-6237 | Unspecified vulnerability in Redhat products A flaw was found in the 389 Directory Server. | 6.5 |
2024-07-09 | CVE-2023-50179 | Improper Certificate Validation vulnerability in Fortinet Fortiadc An improper certificate validation vulnerability [CWE-295] in FortiADC 7.4.0, 7.2 all versions, 7.1 all versions, 7.0 all versions may allow a remote and unauthenticated attacker to perform a Man-in-the-Middle attack on the communication channel between the device and public SDN connectors. | 5.9 |