Search Results (16242 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2022-38023 5 Fedoraproject, Microsoft, Netapp and 2 more 15 Fedora, Windows Server 2008, Windows Server 2012 and 12 more 2025-01-02 8.1 High
Netlogon RPC Elevation of Privilege Vulnerability
CVE-2022-29145 3 Fedoraproject, Microsoft, Redhat 7 Fedora, .net, .net Core and 4 more 2025-01-02 7.5 High
.NET and Visual Studio Denial of Service Vulnerability
CVE-2022-29117 3 Fedoraproject, Microsoft, Redhat 7 Fedora, .net, .net Core and 4 more 2025-01-02 7.5 High
.NET and Visual Studio Denial of Service Vulnerability
CVE-2022-23267 3 Fedoraproject, Microsoft, Redhat 8 Fedora, .net, .net Core and 5 more 2025-01-02 7.5 High
.NET and Visual Studio Denial of Service Vulnerability
CVE-2022-21986 3 Fedoraproject, Microsoft, Redhat 6 Fedora, .net, Visual Studio 2019 and 3 more 2025-01-02 7.5 High
.NET Denial of Service Vulnerability
CVE-2023-35390 2 Microsoft, Redhat 5 .net, Visual Studio 2022, Enterprise Linux and 2 more 2025-01-01 7.8 High
.NET and Visual Studio Remote Code Execution Vulnerability
CVE-2023-33170 3 Fedoraproject, Microsoft, Redhat 6 Fedora, .net, Visual Studio 2022 and 3 more 2025-01-01 8.1 High
ASP.NET and Visual Studio Security Feature Bypass Vulnerability
CVE-2023-33128 2 Microsoft, Redhat 5 .net, Visual Studio 2022, Enterprise Linux and 2 more 2025-01-01 7.3 High
.NET and Visual Studio Remote Code Execution Vulnerability
CVE-2023-32032 2 Microsoft, Redhat 3 .net, Visual Studio 2022, Enterprise Linux 2025-01-01 6.5 Medium
.NET and Visual Studio Elevation of Privilege Vulnerability
CVE-2023-29337 2 Microsoft, Redhat 4 Nuget, Enterprise Linux, Rhel Dotnet and 1 more 2025-01-01 7.1 High
NuGet Client Remote Code Execution Vulnerability
CVE-2023-24936 2 Microsoft, Redhat 16 .net, .net Framework, Windows 10 1507 and 13 more 2025-01-01 7.5 High
.NET, .NET Framework, and Visual Studio Elevation of Privilege Vulnerability
CVE-2023-21538 3 Fedoraproject, Microsoft, Redhat 5 Fedora, .net, Powershell and 2 more 2025-01-01 7.5 High
.NET Denial of Service Vulnerability
CVE-2024-0444 2 Gstreamer Project, Redhat 2 Gstreamer, Enterprise Linux 2024-12-27 8.8 High
GStreamer AV1 Video Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GStreamer. Interaction with this library is required to exploit this vulnerability but attack vectors may vary depending on the implementation. The specific flaw exists within the parsing of tile list data within AV1-encoded video files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-22873.
CVE-2018-20060 3 Fedoraproject, Python, Redhat 4 Fedora, Urllib3, Ansible Tower and 1 more 2024-12-27 N/A
urllib3 before version 1.23 does not remove the Authorization HTTP header when following a cross-origin redirect (i.e., a redirect that differs in host, port, or scheme). This can allow for credentials in the Authorization header to be exposed to unintended hosts or transmitted in cleartext.
CVE-2018-12121 2 Nodejs, Redhat 9 Node.js, Enterprise Linux, Enterprise Linux Desktop and 6 more 2024-12-27 7.5 High
Node.js: All versions prior to Node.js 6.15.0, 8.14.0, 10.14.0 and 11.3.0: Denial of Service with large HTTP headers: By using a combination of many requests with maximum sized headers (almost 80 KB per connection), and carefully timed completion of the headers, it is possible to cause the HTTP server to abort from heap allocation failure. Attack potential is mitigated by the use of a load balancer or other proxy layer.
CVE-2019-17546 3 Libtiff, Osgeo, Redhat 3 Libtiff, Gdal, Enterprise Linux 2024-12-20 8.8 High
tif_getimage.c in LibTIFF through 4.0.10, as used in GDAL through 3.0.1 and other products, has an integer overflow that potentially causes a heap-based buffer overflow via a crafted RGBA image, related to a "Negative-size-param" condition.
CVE-2024-36885 1 Redhat 1 Enterprise Linux 2024-12-19 4.4 Medium
This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
CVE-2024-35928 1 Redhat 1 Enterprise Linux 2024-12-19 5.5 Medium
This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
CVE-2024-26720 1 Redhat 2 Enterprise Linux, Rhel Eus 2024-12-19 5.5 Medium
This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
CVE-2024-8508 3 Debian, Nlnetlabs, Redhat 5 Debian Linux, Unbound, Enterprise Linux and 2 more 2024-12-17 5.3 Medium
NLnet Labs Unbound up to and including version 1.21.0 contains a vulnerability when handling replies with very large RRsets that it needs to perform name compression for. Malicious upstreams responses with very large RRsets can cause Unbound to spend a considerable time applying name compression to downstream replies. This can lead to degraded performance and eventually denial of service in well orchestrated attacks. The vulnerability can be exploited by a malicious actor querying Unbound for the specially crafted contents of a malicious zone with very large RRsets. Before Unbound replies to the query it will try to apply name compression which was an unbounded operation that could lock the CPU until the whole packet was complete. Unbound version 1.21.1 introduces a hard limit on the number of name compression calculations it is willing to do per packet. Packets that need more compression will result in semi-compressed packets or truncated packets, even on TCP for huge messages, to avoid locking the CPU for long. This change should not affect normal DNS traffic.