CVE |
Vendors |
Products |
Updated |
CVSS v3.1 |
SQUID is vulnerable to HTTP request smuggling, caused by chunked decoder lenience, allows a remote attacker to perform Request/Response smuggling past firewall and frontend security systems. |
A flaw was found in Quarkus where HTTP security policies are not sanitizing certain character permutations correctly when accepting requests, resulting in incorrect evaluation of permissions. This issue could allow an attacker to bypass the security policy altogether, resulting in unauthorized endpoint access and possibly a denial of service. |
An out-of-bounds memory access flaw was found in the Linux kernel’s TUN/TAP device driver functionality in how a user generates a malicious (too big) networking packet when napi frags is enabled. This flaw allows a local user to crash or potentially escalate their privileges on the system. |
A flaw was found in the Skupper operator, which may permit a certain configuration to create a service account that would allow an authenticated attacker in the adjacent cluster to view deployments in all namespaces in the cluster. This issue permits unauthorized viewing of information outside of the user's purview. |
Versions of the package pdfmake before 0.3.0-beta.17 are vulnerable to Allocation of Resources Without Limits or Throttling via repeatedly redirect URL in file embedding. An attacker can cause the application to crash or become unresponsive by providing crafted input that triggers this condition. |
An uninitialized variable in the HTTP CGI request arguments processing component of Vigor Routers running DrayOS may allow an attacker the ability to perform RCE on the appliance through memory corruption. |
This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. |
Considered by the maintainers a bug scenario experienced rather than a vulnerability. |
An insecure implementation of the proprietary protocol DNET in Product CGM MEDICO allows attackers within the intranet to eavesdrop and manipulate data on the protocol because encryption is optional for this connection. |
ASP.NET Core Denial of Service Vulnerability |
.NET, .NET Framework, and Visual Studio Elevation of Privilege Vulnerability |
ASP.NET Core Security Feature Bypass Vulnerability |
Microsoft Speech Application Programming Interface (SAPI) Elevation of Privilege Vulnerability |
PowerShell Information Disclosure Vulnerability |
Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability |
Visual Studio Code Jupyter Extension Spoofing Vulnerability |
Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability |
Microsoft Windows Defender Elevation of Privilege Vulnerability |
Windows SmartScreen Security Feature Bypass Vulnerability |
Microsoft Protected Extensible Authentication Protocol (PEAP) Remote Code Execution Vulnerability |