Microsoft QUIC Denial of Service Vulnerability
Max CVSS
7.5
EPSS Score
0.05%
Published
2024-03-12
Updated
2024-03-12
Microsoft AllJoyn API Denial of Service Vulnerability
Max CVSS
7.5
EPSS Score
0.05%
Published
2024-03-12
Updated
2024-03-12
.NET Denial of Service Vulnerability
Max CVSS
7.5
EPSS Score
0.06%
Published
2024-02-13
Updated
2024-02-22
.NET and Visual Studio Denial of Service Vulnerability
Max CVSS
7.5
EPSS Score
0.05%
Published
2024-03-12
Updated
2024-03-12
.NET Denial of Service Vulnerability
Max CVSS
7.5
EPSS Score
0.06%
Published
2024-02-13
Updated
2024-02-22
Internet Connection Sharing (ICS) Denial of Service Vulnerability
Max CVSS
7.5
EPSS Score
0.06%
Published
2024-02-13
Updated
2024-03-07
Windows Network Address Translation (NAT) Denial of Service Vulnerability
Max CVSS
7.5
EPSS Score
0.06%
Published
2024-02-13
Updated
2024-02-27
Windows DNS Client Denial of Service Vulnerability
Max CVSS
7.5
EPSS Score
0.06%
Published
2024-02-13
Updated
2024-02-22
.NET Framework Denial of Service Vulnerability
Max CVSS
7.5
EPSS Score
0.14%
Published
2024-01-09
Updated
2024-02-08
Microsoft AllJoyn API Denial of Service Vulnerability
Max CVSS
7.5
EPSS Score
0.14%
Published
2024-01-09
Updated
2024-01-14
.NET Denial of Service Vulnerability
Max CVSS
7.5
EPSS Score
0.14%
Published
2024-01-09
Updated
2024-01-14
Microsoft Message Queuing Denial of Service Vulnerability
Max CVSS
7.5
EPSS Score
0.09%
Published
2024-01-09
Updated
2024-01-14
Certain DNSSEC aspects of the DNS protocol (in RFC 4033, 4034, 4035, 6840, and related RFCs) allow remote attackers to cause a denial of service (CPU consumption) via one or more DNSSEC responses, aka the "KeyTrap" issue. One of the concerns is that, when there is a zone with many DNSKEY and RRSIG records, the protocol specification implies that an algorithm must evaluate all combinations of DNSKEY and RRSIG records.
Max CVSS
7.5
EPSS Score
3.66%
Published
2024-02-14
Updated
2024-03-07

CVE-2023-44487

Known exploited
The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.
Max CVSS
7.5
EPSS Score
70.59%
Published
2023-10-10
Updated
2024-02-02
CISA KEV Added
2023-10-10

CVE-2023-38180

Known exploited
.NET and Visual Studio Denial of Service Vulnerability
Max CVSS
7.5
EPSS Score
0.51%
Published
2023-08-08
Updated
2023-08-20
CISA KEV Added
2023-08-09
.NET Core and Visual Studio Denial of Service Vulnerability
Max CVSS
7.5
EPSS Score
0.06%
Published
2023-08-08
Updated
2023-08-11
Microsoft Message Queuing Denial of Service Vulnerability
Max CVSS
7.5
EPSS Score
0.06%
Published
2023-08-08
Updated
2023-08-11
Microsoft QUIC Denial of Service Vulnerability
Max CVSS
7.5
EPSS Score
0.16%
Published
2023-10-10
Updated
2023-10-12
DHCP Server Service Denial of Service Vulnerability
Max CVSS
7.5
EPSS Score
0.09%
Published
2023-09-12
Updated
2023-09-14
Windows TCP/IP Denial of Service Vulnerability
Max CVSS
7.5
EPSS Score
0.09%
Published
2023-09-12
Updated
2023-09-14
Microsoft Message Queuing Denial of Service Vulnerability
Max CVSS
7.5
EPSS Score
0.06%
Published
2023-08-08
Updated
2023-08-10
Windows Mixed Reality Developer Tools Denial of Service Vulnerability
Max CVSS
7.5
EPSS Score
0.16%
Published
2023-10-10
Updated
2023-10-13
Microsoft AllJoyn API Denial of Service Vulnerability
Max CVSS
7.5
EPSS Score
0.16%
Published
2023-10-10
Updated
2023-10-13
Windows Deployment Services Denial of Service Vulnerability
Max CVSS
7.5
EPSS Score
0.16%
Published
2023-10-10
Updated
2023-10-13
DHCP Server Service Denial of Service Vulnerability
Max CVSS
7.5
EPSS Score
0.16%
Published
2023-10-10
Updated
2023-10-12
1193 vulnerabilities found
1 2 3 4 5 6 ...... 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!