Show filters
4,326 Total Results
Displaying 41-50 of 4,326
Sort by:
Attacker Value
Unknown
CVE-2023-38545
Disclosure Date: October 18, 2023 (last updated February 14, 2025)
This flaw makes curl overflow a heap based buffer in the SOCKS5 proxy
handshake.
When curl is asked to pass along the host name to the SOCKS5 proxy to allow
that to resolve the address instead of it getting done by curl itself, the
maximum length that host name can be is 255 bytes.
If the host name is detected to be longer, curl switches to local name
resolving and instead passes on the resolved address only. Due to this bug,
the local variable that means "let the host resolve the name" could get the
wrong value during a slow SOCKS5 handshake, and contrary to the intention,
copy the too long host name to the target buffer instead of copying just the
resolved address there.
The target buffer being a heap based buffer, and the host name coming from the
URL that curl has been told to operate with.
4
Attacker Value
Very High
CVE-2022-21906
Disclosure Date: January 11, 2022 (last updated November 28, 2024)
Windows Defender Application Control Security Feature Bypass Vulnerability
3
Attacker Value
Unknown
CVE-2021-38666
Disclosure Date: November 10, 2021 (last updated November 28, 2024)
Remote Desktop Client Remote Code Execution Vulnerability
3
Attacker Value
High
CVE-2021-34448
Disclosure Date: July 16, 2021 (last updated November 28, 2024)
Scripting Engine Memory Corruption Vulnerability
3
Attacker Value
Moderate
CVE-2021-33739
Disclosure Date: June 08, 2021 (last updated November 28, 2024)
Microsoft DWM Core Library Elevation of Privilege Vulnerability
3
Attacker Value
Very Low
CVE-2021-24094
Disclosure Date: February 25, 2021 (last updated November 28, 2024)
Windows TCP/IP Remote Code Execution Vulnerability
3
Attacker Value
Low
CVE-2020-12695 "CallStranger"
Disclosure Date: June 08, 2020 (last updated February 21, 2025)
The Open Connectivity Foundation UPnP specification before 2020-04-17 does not forbid the acceptance of a subscription request with a delivery URL on a different network segment than the fully qualified event-subscription URL, aka the CallStranger issue.
2
Attacker Value
Low
ADV200006 - Type 1 Font Parsing Remote Code Execution Vulnerability in Windows
Disclosure Date: April 15, 2020 (last updated October 06, 2023)
A remote code execution vulnerability exists in Microsoft Windows when the Windows Adobe Type Manager Library improperly handles a specially-crafted multi-master font - Adobe Type 1 PostScript format.For all systems except Windows 10, an attacker who successfully exploited the vulnerability could execute code remotely, aka 'Adobe Font Manager Library Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-1020.
1
Attacker Value
Moderate
CVE-2020-0787 Windows BITS Privesc
Disclosure Date: March 12, 2020 (last updated February 21, 2025)
An elevation of privilege vulnerability exists when the Windows Background Intelligent Transfer Service (BITS) improperly handles symbolic links, aka 'Windows Background Intelligent Transfer Service Elevation of Privilege Vulnerability'.
1
Attacker Value
High
CVE-2019-1458
Disclosure Date: December 10, 2019 (last updated November 27, 2024)
An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory, aka 'Win32k Elevation of Privilege Vulnerability'.
3