Show filters
1,296 Total Results
Displaying 11-20 of 1,296
Sort by:
Attacker Value
Unknown
CVE-2023-38545
Disclosure Date: October 18, 2023 (last updated February 14, 2025)
This flaw makes curl overflow a heap based buffer in the SOCKS5 proxy
handshake.
When curl is asked to pass along the host name to the SOCKS5 proxy to allow
that to resolve the address instead of it getting done by curl itself, the
maximum length that host name can be is 255 bytes.
If the host name is detected to be longer, curl switches to local name
resolving and instead passes on the resolved address only. Due to this bug,
the local variable that means "let the host resolve the name" could get the
wrong value during a slow SOCKS5 handshake, and contrary to the intention,
copy the too long host name to the target buffer instead of copying just the
resolved address there.
The target buffer being a heap based buffer, and the host name coming from the
URL that curl has been told to operate with.
4
Attacker Value
Unknown
CVE-2023-24880
Disclosure Date: March 14, 2023 (last updated February 05, 2025)
Windows SmartScreen Security Feature Bypass Vulnerability
3
Attacker Value
Unknown
CVE-2024-21307
Disclosure Date: January 09, 2024 (last updated January 12, 2025)
Remote Desktop Client Remote Code Execution Vulnerability
3
Attacker Value
Unknown
CVE-2024-30078
Disclosure Date: June 11, 2024 (last updated January 12, 2025)
Windows Wi-Fi Driver Remote Code Execution Vulnerability
3
Attacker Value
Very High
CVE-2024-49112
Disclosure Date: December 12, 2024 (last updated January 15, 2025)
Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability
2
Attacker Value
Low
CVE-2024-21306
Disclosure Date: January 09, 2024 (last updated January 12, 2025)
Microsoft Bluetooth Driver Spoofing Vulnerability
2
Attacker Value
High
CVE-2024-30088
Disclosure Date: June 11, 2024 (last updated January 12, 2025)
Windows Kernel Elevation of Privilege Vulnerability
1
Attacker Value
Unknown
CVE-2024-21302
Disclosure Date: August 08, 2024 (last updated September 18, 2024)
Summary:
Microsoft was notified that an elevation of privilege vulnerability exists in Windows based systems supporting Virtualization Based Security (VBS), including a subset of Azure Virtual Machine SKUS. This vulnerability enables an attacker with administrator privileges to replace current versions of Windows system files with outdated versions. By exploiting this vulnerability, an attacker could reintroduce previously mitigated vulnerabilities, circumvent some features of VBS, and exfiltrate data protected by VBS.
Microsoft is developing a security update to mitigate this threat, but it is not yet available. Guidance to help customers reduce the risks associated with this vulnerability and to protect their systems until the mitigation is available in a Windows security update is provided in the Recommended Actions section of this CVE.
This CVE will be updated when the mitigation is available in a Windows security update. We highly encourage customers to subscribe to Security Upda…
2
Attacker Value
Unknown
CVE-2022-41033
Disclosure Date: October 11, 2022 (last updated January 11, 2025)
Windows COM+ Event System Service Elevation of Privilege Vulnerability
2
Attacker Value
Very Low
CVE-2024-49113
Disclosure Date: December 12, 2024 (last updated January 15, 2025)
Windows Lightweight Directory Access Protocol (LDAP) Denial of Service Vulnerability
1