CVE-2024-8762
Vie, 13/09/2024 – 01:15
CVE-2024-8762
CVE-2024-8762
Vie, 13/09/2024 – 01:15
CVE-2024-8762
CVE-2024-8641
Jue, 12/09/2024 – 19:15
CVE-2024-8641
CVE-2024-8751
Jue, 12/09/2024 – 22:15
CVE-2024-8751
CVE-2024-8311
Jue, 12/09/2024 – 19:15
CVE-2024-8311
CVE-2024-44460
Jue, 12/09/2024 – 20:15
CVE-2024-44460
CVE-2024-44459
Jue, 12/09/2024 – 20:15
CVE-2024-44459
CVE-2024-20430
Jue, 12/09/2024 – 20:15
CVE-2024-20430
This vulnerability is due to incorrect handling of directory search paths at runtime. A low-privileged attacker could exploit this vulnerability by placing both malicious configuration files and malicious DLL files on an affected system, which would read and execute the files when Cisco Meraki SM launches on startup. A successful exploit could allow the attacker to execute arbitrary code on the affected system with SYSTEM privileges.
CVE-2024-8533
Jue, 12/09/2024 – 20:15
CVE-2024-8533
CVE-2024-6077
Jue, 12/09/2024 – 20:15
CVE-2024-6077
CVE-2024-45607
Jue, 12/09/2024 – 20:15
CVE-2024-45607