CVE-2024-38520 – SoftEther VPN with L2TP - 2.75x Amplification
https://notcve.org/view.php?id=CVE-2024-38520
Cuando SoftEtherVPN se implementa con L2TP habilitado en un dispositivo, presenta la posibilidad de que el host se utilice para la generación de tráfico de amplificación/reflexión porque responderá a cada paquete con dos paquetes de respuesta que son más grandes que el tamaño del paquete de solicitud. • https://github.com/SoftEtherVPN/SoftEtherVPN/commit/c2a7aa548137dc80c6aafdc645cf4dc34e0dc764 https://github.com/SoftEtherVPN/SoftEtherVPN/releases/tag/5.02.5185 https://github.com/SoftEtherVPN/SoftEtherVPN/security/advisories/GHSA-j35p-p8pj-vqxq • CWE-400: Uncontrolled Resource Consumption •
CVE-2024-38271 – Denial of Service in Quick Share
https://notcve.org/view.php?id=CVE-2024-38271
There exists a vulnerability in Quickshare/Nearby where an attacker can force the a victim to stay connected to a temporary hotspot created for the share. As part of the sequence of packets in a QuickShare connection over Bluetooth, the attacker forces the victim to connect to the attacker’s WiFi network and then sends an OfflineFrame that crashes Quick Share. This makes the Wifi connection to the attacker’s network last instead of returning to the old network when the Quick Share session is done allowing the attacker to be a MiTM. We recommend upgrading to version 1.0.1724.0 of Quickshare or above Existe una vulnerabilidad en Quickshare/Nearby donde un atacante puede obligar a la víctima a permanecer conectada a un punto de acceso temporal creado para el recurso compartido. Como parte de la secuencia de paquetes en una conexión QuickShare a través de Bluetooth, el atacante obliga a la víctima a conectarse a la red WiFi del atacante y luego envía un OfflineFrame que bloquea Quick Share. Esto hace que la conexión Wifi a la red del atacante dure en lugar de regresar a la red anterior cuando finaliza la sesión de Quick Share, lo que permite que el atacante sea un MiTM. • https://github.com/google/nearby/pull/2433 https://github.com/google/nearby/pull/2435 https://github.com/google/nearby/pull/2589 https://github.com/google/nearby/pull/2402 • CWE-404: Improper Resource Shutdown or Release •
CVE-2024-37139
https://notcve.org/view.php?id=CVE-2024-37139
Exploitation may lead to denial of service of the application. • https://www.dell.com/support/kbdoc/en-us/000226148/dsa-2024-219-dell-technologies-powerprotect-dd-security-update-for-multiple-security-vulnerabilities • CWE-664: Improper Control of a Resource Through its Lifetime •
CVE-2024-37571
https://notcve.org/view.php?id=CVE-2024-37571
Buffer Overflow vulnerability in SAS Broker 9.2 build 1495 allows attackers to cause denial of service or obtain sensitive information via crafted payload to the '_debug' parameter. • https://gist.github.com/MILPDS/e9da6d07ba1789defacec08f2f03293d • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •
CVE-2024-23766
https://notcve.org/view.php?id=CVE-2024-23766
An attacker can use this feature to carry out a denial of service attack by continuously sending GET requests to that URL. • https://sensepost.com/blog/2024/targeting-an-industrial-protocol-gateway • CWE-598: Use of GET Request Method With Sensitive Query Strings •