Show filters
1,296 Total Results
Displaying 11-20 of 1,296
Sort by:
Attacker Value
Unknown

CVE-2023-38545

Disclosure Date: October 18, 2023 (last updated February 14, 2025)
This flaw makes curl overflow a heap based buffer in the SOCKS5 proxy handshake. When curl is asked to pass along the host name to the SOCKS5 proxy to allow that to resolve the address instead of it getting done by curl itself, the maximum length that host name can be is 255 bytes. If the host name is detected to be longer, curl switches to local name resolving and instead passes on the resolved address only. Due to this bug, the local variable that means "let the host resolve the name" could get the wrong value during a slow SOCKS5 handshake, and contrary to the intention, copy the too long host name to the target buffer instead of copying just the resolved address there. The target buffer being a heap based buffer, and the host name coming from the URL that curl has been told to operate with.
Attacker Value
Unknown

CVE-2023-24880

Disclosure Date: March 14, 2023 (last updated February 05, 2025)
Windows SmartScreen Security Feature Bypass Vulnerability
3
Attacker Value
Unknown

CVE-2024-21307

Disclosure Date: January 09, 2024 (last updated January 12, 2025)
Remote Desktop Client Remote Code Execution Vulnerability
Attacker Value
Unknown

CVE-2024-30078

Disclosure Date: June 11, 2024 (last updated January 12, 2025)
Windows Wi-Fi Driver Remote Code Execution Vulnerability
Attacker Value
Very High

CVE-2024-49112

Disclosure Date: December 12, 2024 (last updated January 15, 2025)
Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability
2
Attacker Value
Low

CVE-2024-21306

Disclosure Date: January 09, 2024 (last updated January 12, 2025)
Microsoft Bluetooth Driver Spoofing Vulnerability
Attacker Value
High

CVE-2024-30088

Disclosure Date: June 11, 2024 (last updated January 12, 2025)
Windows Kernel Elevation of Privilege Vulnerability
Attacker Value
Unknown

CVE-2024-21302

Disclosure Date: August 08, 2024 (last updated September 18, 2024)
Summary: Microsoft was notified that an elevation of privilege vulnerability exists in Windows based systems supporting Virtualization Based Security (VBS), including a subset of Azure Virtual Machine SKUS. This vulnerability enables an attacker with administrator privileges to replace current versions of Windows system files with outdated versions. By exploiting this vulnerability, an attacker could reintroduce previously mitigated vulnerabilities, circumvent some features of VBS, and exfiltrate data protected by VBS. Microsoft is developing a security update to mitigate this threat, but it is not yet available. Guidance to help customers reduce the risks associated with this vulnerability and to protect their systems until the mitigation is available in a Windows security update is provided in the Recommended Actions section of this CVE. This CVE will be updated when the mitigation is available in a Windows security update. We highly encourage customers to subscribe to Security Upda…
Attacker Value
Unknown

CVE-2022-41033

Disclosure Date: October 11, 2022 (last updated January 11, 2025)
Windows COM+ Event System Service Elevation of Privilege Vulnerability
Attacker Value
Very Low

CVE-2024-49113

Disclosure Date: December 12, 2024 (last updated January 15, 2025)
Windows Lightweight Directory Access Protocol (LDAP) Denial of Service Vulnerability
1