Page 156 of 1043 results (0.019 seconds)

CVSS: 7.8EPSS: 0%CPEs: 81EXPL: 0

.NET, .NET Framework, and Visual Studio Remote Code Execution Vulnerability • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24897 • CWE-122: Heap-based Buffer Overflow •

CVSS: 7.5EPSS: 0%CPEs: 82EXPL: 0

.NET, .NET Framework, and Visual Studio Denial of Service Vulnerability A vulnerability was found in dotnet. This issue can lead to a denial of service while processing X509 Certificates. • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29331 https://access.redhat.com/security/cve/CVE-2023-29331 https://bugzilla.redhat.com/show_bug.cgi?id=2212617 • CWE-400: Uncontrolled Resource Consumption •

CVSS: 7.5EPSS: 0%CPEs: 82EXPL: 0

.NET, .NET Framework, and Visual Studio Elevation of Privilege Vulnerability A flaw was found in dotnet. This issue can allow bypass restrictions when deserializing a DataSet or DataTable from XML. • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24936 https://access.redhat.com/security/cve/CVE-2023-24936 https://bugzilla.redhat.com/show_bug.cgi?id=2192438 •

CVSS: 6.5EPSS: 0%CPEs: 15EXPL: 0

Windows CryptoAPI Denial of Service Vulnerability • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24937 • CWE-20: Improper Input Validation •

CVSS: 4.7EPSS: 4%CPEs: 17EXPL: 0

Windows Kernel Information Disclosure Vulnerability Due to some design problems in how transactions are implemented in the registry, it is possible for a low-privileged local attacker to force a non-atomic outcome of a transaction used by another high-privileged process in the system. • http://packetstormsecurity.com/files/173310/Windows-Kernel-KTM-Registry-Transactions-Non-Atomic-Outcomes.html https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-32019 • CWE-668: Exposure of Resource to Wrong Sphere •