CVE-2023-44487

Known exploited
The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.
Max CVSS
7.5
EPSS Score
73.23%
Published
2023-10-10
Updated
2024-02-02
CISA KEV Added
2023-10-10
Layer 2 Tunneling Protocol Remote Code Execution Vulnerability
Max CVSS
8.1
EPSS Score
0.55%
Published
2023-10-10
Updated
2023-10-12
Layer 2 Tunneling Protocol Remote Code Execution Vulnerability
Max CVSS
8.1
EPSS Score
0.55%
Published
2023-10-10
Updated
2023-10-12
Win32k Elevation of Privilege Vulnerability
Max CVSS
7.8
EPSS Score
0.20%
Published
2023-10-10
Updated
2023-10-12
Layer 2 Tunneling Protocol Remote Code Execution Vulnerability
Max CVSS
8.1
EPSS Score
0.55%
Published
2023-10-10
Updated
2023-10-12
Layer 2 Tunneling Protocol Remote Code Execution Vulnerability
Max CVSS
8.1
EPSS Score
0.55%
Published
2023-10-10
Updated
2023-10-12
Layer 2 Tunneling Protocol Remote Code Execution Vulnerability
Max CVSS
8.1
EPSS Score
0.55%
Published
2023-10-10
Updated
2023-10-12
Layer 2 Tunneling Protocol Remote Code Execution Vulnerability
Max CVSS
8.1
EPSS Score
0.55%
Published
2023-10-10
Updated
2023-10-12
Layer 2 Tunneling Protocol Remote Code Execution Vulnerability
Max CVSS
8.1
EPSS Score
0.55%
Published
2023-10-10
Updated
2023-10-12
Windows Client Server Run-time Subsystem (CSRSS) Elevation of Privilege Vulnerability
Max CVSS
7.8
EPSS Score
0.05%
Published
2023-10-10
Updated
2023-10-12
Layer 2 Tunneling Protocol Remote Code Execution Vulnerability
Max CVSS
8.1
EPSS Score
0.55%
Published
2023-10-10
Updated
2023-10-12
This flaw makes curl overflow a heap based buffer in the SOCKS5 proxy handshake. When curl is asked to pass along the host name to the SOCKS5 proxy to allow that to resolve the address instead of it getting done by curl itself, the maximum length that host name can be is 255 bytes. If the host name is detected to be longer, curl switches to local name resolving and instead passes on the resolved address only. Due to this bug, the local variable that means "let the host resolve the name" could get the wrong value during a slow SOCKS5 handshake, and contrary to the intention, copy the too long host name to the target buffer instead of copying just the resolved address there. The target buffer being a heap based buffer, and the host name coming from the URL that curl has been told to operate with.
Max CVSS
9.8
EPSS Score
0.18%
Published
2023-10-18
Updated
2024-04-01
Microsoft Message Queuing Denial of Service Vulnerability
Max CVSS
6.5
EPSS Score
0.06%
Published
2023-08-08
Updated
2023-08-10
Windows Mobile Device Management Elevation of Privilege Vulnerability
Max CVSS
9.8
EPSS Score
0.16%
Published
2023-08-08
Updated
2023-11-06
Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability
Max CVSS
7.5
EPSS Score
0.21%
Published
2023-08-08
Updated
2023-08-11
Microsoft Message Queuing Denial of Service Vulnerability
Max CVSS
7.5
EPSS Score
0.06%
Published
2023-08-08
Updated
2023-08-11
Layer 2 Tunneling Protocol Remote Code Execution Vulnerability
Max CVSS
8.1
EPSS Score
0.55%
Published
2023-10-10
Updated
2023-10-12
Windows GDI Elevation of Privilege Vulnerability
Max CVSS
7.8
EPSS Score
0.05%
Published
2023-09-12
Updated
2024-03-07
Windows TCP/IP Information Disclosure Vulnerability
Max CVSS
5.5
EPSS Score
0.05%
Published
2023-09-12
Updated
2023-09-14
Windows Graphics Component Elevation of Privilege Vulnerability
Max CVSS
7.0
EPSS Score
0.04%
Published
2023-10-10
Updated
2023-10-12
Windows Kernel Elevation of Privilege Vulnerability
Max CVSS
7.8
EPSS Score
0.05%
Published
2023-09-12
Updated
2023-09-14
Windows TCP/IP Denial of Service Vulnerability
Max CVSS
7.5
EPSS Score
0.09%
Published
2023-09-12
Updated
2023-09-14
Internet Connection Sharing (ICS) Remote Code Execution Vulnerability
Max CVSS
8.8
EPSS Score
0.11%
Published
2023-09-12
Updated
2023-09-14
Windows Miracast Wireless Display Remote Code Execution Vulnerability
Max CVSS
8.8
EPSS Score
0.11%
Published
2023-09-12
Updated
2023-09-14

CVE-2023-38146

Public exploit
Windows Themes Remote Code Execution Vulnerability
Max CVSS
8.8
EPSS Score
85.84%
Published
2023-09-12
Updated
2024-01-05
516 vulnerabilities found
1 2 3 4 5 6 ...... 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!