Total
3214 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2024-21319 | 2 Microsoft, Redhat | 5 .net, Identity Model, Visual Studio 2022 and 2 more | 2025-05-03 | 6.8 Medium |
Microsoft Identity Denial of service vulnerability | ||||
CVE-2024-20672 | 1 Microsoft | 1 .net | 2025-05-03 | 7.5 High |
.NET Denial of Service Vulnerability | ||||
CVE-2024-20661 | 1 Microsoft | 13 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 10 more | 2025-05-03 | 7.5 High |
Microsoft Message Queuing (MSMQ) Denial of Service Vulnerability | ||||
CVE-2024-21404 | 2 Microsoft, Redhat | 5 Asp.net Core, Visual Studio 2022, Enterprise Linux and 2 more | 2025-05-03 | 7.5 High |
.NET Denial of Service Vulnerability | ||||
CVE-2024-21386 | 2 Microsoft, Redhat | 4 Asp.net Core, Visual Studio 2022, Enterprise Linux and 1 more | 2025-05-03 | 7.5 High |
.NET Denial of Service Vulnerability | ||||
CVE-2024-21342 | 1 Microsoft | 3 Windows 11 22h2, Windows 11 23h2, Windows Server 2022 23h2 | 2025-05-03 | 7.5 High |
Windows DNS Client Denial of Service Vulnerability | ||||
CVE-2024-26190 | 1 Microsoft | 8 .net, Powershell, Visual Studio 2022 and 5 more | 2025-05-03 | 7.5 High |
Microsoft QUIC Denial of Service Vulnerability | ||||
CVE-2024-21392 | 2 Microsoft, Redhat | 4 .net, Powershell, Visual Studio 2022 and 1 more | 2025-05-03 | 7.5 High |
.NET and Visual Studio Denial of Service Vulnerability | ||||
CVE-2024-26215 | 1 Microsoft | 6 Windows Server 2008, Windows Server 2012, Windows Server 2016 and 3 more | 2025-05-03 | 7.5 High |
DHCP Server Service Denial of Service Vulnerability | ||||
CVE-2024-26212 | 1 Microsoft | 6 Windows Server 2008, Windows Server 2012, Windows Server 2016 and 3 more | 2025-05-03 | 7.5 High |
DHCP Server Service Denial of Service Vulnerability | ||||
CVE-2024-30019 | 1 Microsoft | 6 Windows Server 2008, Windows Server 2012, Windows Server 2016 and 3 more | 2025-05-03 | 6.5 Medium |
DHCP Server Service Denial of Service Vulnerability | ||||
CVE-2024-38068 | 1 Microsoft | 14 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 11 more | 2025-05-02 | 7.5 High |
Windows Online Certificate Status Protocol (OCSP) Server Denial of Service Vulnerability | ||||
CVE-2024-38067 | 1 Microsoft | 6 Windows Server 2008, Windows Server 2012, Windows Server 2016 and 3 more | 2025-05-02 | 7.5 High |
Windows Online Certificate Status Protocol (OCSP) Server Denial of Service Vulnerability | ||||
CVE-2024-38031 | 1 Microsoft | 6 Windows Server 2008, Windows Server 2012, Windows Server 2016 and 3 more | 2025-05-02 | 7.5 High |
Windows Online Certificate Status Protocol (OCSP) Server Denial of Service Vulnerability | ||||
CVE-2024-38027 | 1 Microsoft | 14 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 11 more | 2025-05-02 | 6.5 Medium |
Windows Line Printer Daemon Service Denial of Service Vulnerability | ||||
CVE-2024-30105 | 2 Microsoft, Redhat | 3 .net, Visual Studio 2022, Enterprise Linux | 2025-05-02 | 7.5 High |
.NET and Visual Studio Denial of Service Vulnerability | ||||
CVE-2024-38015 | 1 Microsoft | 5 Windows Server 2012, Windows Server 2016, Windows Server 2019 and 2 more | 2025-05-02 | 7.5 High |
Windows Remote Desktop Gateway (RD Gateway) Denial of Service Vulnerability | ||||
CVE-2024-35270 | 1 Microsoft | 14 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 11 more | 2025-05-02 | 5.3 Medium |
Windows iSCSI Service Denial of Service Vulnerability | ||||
CVE-2024-38168 | 1 Microsoft | 2 .net, Visual Studio 2022 | 2025-05-02 | 7.5 High |
.NET and Visual Studio Denial of Service Vulnerability | ||||
CVE-2025-4215 | 2025-05-02 | 3.1 Low | ||
A vulnerability was found in gorhill uBlock Origin up to 1.63.3b16. It has been classified as problematic. Affected is the function currentStateChanged of the file src/js/1p-filters.js of the component UI. The manipulation leads to inefficient regular expression complexity. It is possible to launch the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. Upgrading to version 1.63.3b17 is able to address this issue. The patch is identified as eaedaf5b10d2f7857c6b77fbf7d4a80681d4d46c. It is recommended to upgrade the affected component. |