Buffer Over-read
CWE-126

CVE IDCVSSVendorExploitPatchTrends
CVE-2024-9843A buffer over-read in Ivanti Secure Access Client before 22.7R4 allows a local unauthenticated attacker to cause a denial of service.
CVSS 5Ivanti

-

-

Trending graph for this CVE
CVE-2024-9029A flaw was found in freeimage library. Processing a crafted image can cause a buffer over-read of 1 byte in the read_iptc_profile function in the Source/Metadata/IPTC.cpp file because the size of the profile is not being sanitized, causing a crash in the application linked to the library, resulting in a denial of service.
CVSS 7.5Freeimage project

-

-

Trending graph for this CVE
CVE-2024-7347NGINX Open Source and NGINX Plus have a vulnerability in the ngx_http_mp4_module, which might allow an attacker to over-read NGINX worker memory resulting in its termination, using a specially crafted mp4 file. The issue only affects NGINX if it is built with the ngx_http_mp4_module and the mp4 directive is used in the configuration file. Additionally, the attack is possible only if an attacker can trigger the processing of a specially crafted mp4 file with the ngx_http_mp4_module.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
CVSS 4.7Nginx, et al

-

Patched

Trending graph for this CVE
CVE-2024-6874libcurl's URL API function [curl_url_get()](https://curl.se/libcurl/c/curl_url_get.html) offers punycode conversions, to and from IDN. Asking to convert a name that is exactly 256 bytes, libcurl ends up reading outside of a stack based buffer when built to use the *macidn* IDN backend. The conversion function then fills up the provided buffer exactly - but does not null terminate the string. This flaw can lead to stack contents accidently getting returned as part of the converted string.
CVSS 4.3Haxx

Exploit

Patched

Trending graph for this CVE
CVE-2024-49031Microsoft Office Graphics Remote Code Execution Vulnerability
CVSS 7.8Microsoft

-

Patched

Trending graph for this CVE
CVE-2024-43595Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability
CVSS 6.5Microsoft

-

Patched

Trending graph for this CVE
CVE-2024-43500Windows Resilient File System (ReFS) Information Disclosure Vulnerability
CVSS 5.5Microsoft

-

Patched

Trending graph for this CVE
CVE-2024-43475Microsoft Windows Admin Center Information Disclosure Vulnerability
CVSS 7.3Microsoft

-

Patched

Trending graph for this CVE
CVE-2024-38405[HIGH] These vulnerabilities affect Qualcomm components and are described in further detail in the appropriate Qualcomm security bulletin or security alert. The severity assessment of these issues is provided directly by Qualcomm.
CVSS 6.5Cisco, et al

-

Patched

Trending graph for this CVE
CVE-2024-38403[HIGH] These vulnerabilities affect Qualcomm closed-source components and are described in further detail in the appropriate Qualcomm security bulletin or security alert. The severity assessment of these issues is provided directly by Qualcomm.
CVSS 6.5Citrix, et al

-

Patched

Trending graph for this CVE
CVE-2024-38397Transient DOS while parsing probe response and assoc response frame.
CVSS 7.5Qualcomm

-

Patched

Trending graph for this CVE
CVE-2024-38373FreeRTOS-Plus-TCP is a lightweight TCP/IP stack for FreeRTOS. FreeRTOS-Plus-TCP versions 4.0.0 through 4.1.0 contain a buffer over-read issue in the DNS Response Parser when parsing domain names in a DNS response. A carefully crafted DNS response with domain name length value greater than the actual domain name length, could cause the parser to read beyond the DNS response buffer. This issue affects applications using DNS functionality of the FreeRTOS-Plus-TCP stack. Applications that do not use DNS functionality are not affected, even when the DNS functionality is enabled. This vulnerability has been patched in version 4.1.1.
CVSS 8.1Amazon

-

Patched

Trending graph for this CVE
CVE-2024-38265Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
CVSS 8.8Microsoft

-

Patched

Trending graph for this CVE
CVE-2024-38261Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
CVSS 7.8Microsoft

-

Patched

Trending graph for this CVE
CVE-2024-38250Windows Graphics Component Elevation of Privilege Vulnerability
CVSS 7.8Microsoft

-

Patched

Trending graph for this CVE
CVE-2024-38135Windows Resilient File System (ReFS) Elevation of Privilege Vulnerability
CVSS 7.8Microsoft

-

Patched

Trending graph for this CVE
CVE-2024-38127Windows Hyper-V Elevation of Privilege Vulnerability
CVSS 7.8Microsoft

Exploit

Patched

Trending graph for this CVE
CVE-2024-38071Windows Remote Desktop Licensing Service Denial of Service Vulnerability
CVSS 7.5Microsoft

-

Patched

Trending graph for this CVE
CVE-2024-34459An issue was discovered in xmllint (from libxml2) before 2.11.8 and 2.12.x before 2.12.7. Formatting error messages with xmllint --htmlout can result in a buffer over-read in xmlHTMLPrintFileContext in xmllint.c.
CVSS 7.5Tenable

-

Patched

Trending graph for this CVE
CVE-2024-33427This CVE ID has been rejected or withdrawn by its CVE Numbering Authority for the following reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.
CVSS 6.2

-

Patched

Trending graph for this CVE
CVE-2024-33073Information disclosure while parsing the BSS parameter change count or MLD capabilities fields of the ML IE.
CVSS 8.2Qualcomm

-

Patched

Trending graph for this CVE
CVE-2024-33071Transient DOS while parsing the MBSSID IE from the beacons when IE length is 0.
CVSS 7.5Arubanetworks, et al

-

Patched

Trending graph for this CVE
CVE-2024-33070Transient DOS while parsing ESP IE from beacon/probe response frame.
CVSS 7.5Qualcomm

-

Patched

Trending graph for this CVE
CVE-2024-33064Information disclosure while parsing the multiple MBSSID IEs from the beacon.
CVSS 8.2Google, et al

-

Patched

Trending graph for this CVE
CVE-2024-33057[HIGH] These vulnerabilities affect Qualcomm components and are described in further detail in the appropriate Qualcomm security bulletin or security alert. The severity assessment of these issues is provided directly by Qualcomm.
CVSS 7.5Qualcomm

-

Patched

Trending graph for this CVE
CVE-2024-33051[HIGH] These vulnerabilities affect Qualcomm closed-source components and are described in further detail in the appropriate Qualcomm security bulletin or security alert. The severity assessment of these issues is provided directly by Qualcomm.
CVSS 7.5Cisco, et al

-

Patched

Trending graph for this CVE
CVE-2024-33050[HIGH] These vulnerabilities affect Qualcomm components and are described in further detail in the appropriate Qualcomm security bulletin or security alert. The severity assessment of these issues is provided directly by Qualcomm.
CVSS 7.5Qualcomm

-

Patched

Trending graph for this CVE
CVE-2024-33049[HIGH] These vulnerabilities affect Qualcomm components and are described in further detail in the appropriate Qualcomm security bulletin or security alert. The severity assessment of these issues is provided directly by Qualcomm.
CVSS 7.5Qualcomm

-

Patched

Trending graph for this CVE
CVE-2024-33048[HIGH] These vulnerabilities affect Qualcomm components and are described in further detail in the appropriate Qualcomm security bulletin or security alert. The severity assessment of these issues is provided directly by Qualcomm.
CVSS 7.5Qualcomm

-

Patched

Trending graph for this CVE
CVE-2024-33047Memory corruption when the captureRead QDCM command is invoked from user-space.
CVSS 7.8Qualcomm

-

Patched

Trending graph for this CVE
CVE-2024-33043[HIGH] These vulnerabilities affect Qualcomm components and are described in further detail in the appropriate Qualcomm security bulletin or security alert. The severity assessment of these issues is provided directly by Qualcomm.
CVSS 5.5Apache

-

Patched

Trending graph for this CVE
CVE-2024-33026[HIGH] These vulnerabilities affect Qualcomm components and are described in further detail in the appropriate Qualcomm security bulletin or security alert. The severity assessment of these issues is provided directly by Qualcomm.
CVSS 7.5Qualcomm

-

Patched

Trending graph for this CVE
CVE-2024-33025[HIGH] These vulnerabilities affect Qualcomm components and are described in further detail in the appropriate Qualcomm security bulletin or security alert. The severity assessment of these issues is provided directly by Qualcomm.
CVSS 7.5Qualcomm

-

Patched

Trending graph for this CVE
CVE-2024-33020[HIGH] These vulnerabilities affect Qualcomm components and are described in further detail in the appropriate Qualcomm security bulletin or security alert. The severity assessment of these issues is provided directly by Qualcomm.
CVSS 7.5Cisco

-

Patched

Trending graph for this CVE
CVE-2024-33019[HIGH] These vulnerabilities affect Qualcomm components and are described in further detail in the appropriate Qualcomm security bulletin or security alert. The severity assessment of these issues is provided directly by Qualcomm.
CVSS 7.5Qualcomm

-

Patched

Trending graph for this CVE
CVE-2024-33018[HIGH] These vulnerabilities affect Qualcomm components and are described in further detail in the appropriate Qualcomm security bulletin or security alert. The severity assessment of these issues is provided directly by Qualcomm.
CVSS 7.5Qualcomm

-

Patched

Trending graph for this CVE
CVE-2024-33015[HIGH] These vulnerabilities affect Qualcomm components and are described in further detail in the appropriate Qualcomm security bulletin or security alert. The severity assessment of these issues is provided directly by Qualcomm.
CVSS 7.5Qualcomm

-

Patched

Trending graph for this CVE
CVE-2024-33014[HIGH] These vulnerabilities affect Qualcomm components and are described in further detail in the appropriate Qualcomm security bulletin or security alert. The severity assessment of these issues is provided directly by Qualcomm.
CVSS 7.5Qualcomm

-

Patched

Trending graph for this CVE
CVE-2024-33013[HIGH] These vulnerabilities affect Qualcomm components and are described in further detail in the appropriate Qualcomm security bulletin or security alert. The severity assessment of these issues is provided directly by Qualcomm.
CVSS 7.5Qualcomm

-

Patched

Trending graph for this CVE
CVE-2024-33012[HIGH] These vulnerabilities affect Qualcomm components and are described in further detail in the appropriate Qualcomm security bulletin or security alert. The severity assessment of these issues is provided directly by Qualcomm.
CVSS 7.5Qualcomm

-

Patched

Trending graph for this CVE
CVE-2024-33011[HIGH] These vulnerabilities affect Qualcomm components and are described in further detail in the appropriate Qualcomm security bulletin or security alert. The severity assessment of these issues is provided directly by Qualcomm.
CVSS 7.5Cisco

-

Patched

Trending graph for this CVE
CVE-2024-31082A heap-based buffer over-read vulnerability was found in the X.org server's ProcAppleDRICreatePixmap() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker's inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads.
CVSS 7.3X.org

-

-

Trending graph for this CVE
CVE-2024-31081A heap-based buffer over-read vulnerability was found in the X.org server's ProcXIPassiveGrabDevice() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker's inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads.
CVSS 7.3

-

-

Trending graph for this CVE
CVE-2024-31080A heap-based buffer over-read vulnerability was found in the X.org server's ProcXIGetSelectedEvents() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker's inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads.
CVSS 7.3

-

Patched

Trending graph for this CVE
CVE-2024-3077An malicious BLE device can crash BLE victim device by sending malformed gatt packet
CVSS 6.8

-

-

Trending graph for this CVE
CVE-2024-30079Windows Remote Access Connection Manager Elevation of Privilege Vulnerability
CVSS 7.8Microsoft

-

Patched

Trending graph for this CVE
CVE-2024-30071Windows Remote Access Connection Manager Information Disclosure Vulnerability
CVSS 4.7Microsoft

-

Patched

Trending graph for this CVE
CVE-2024-30069Windows Remote Access Connection Manager Information Disclosure Vulnerability
CVSS 4.7Microsoft

-

Patched

Trending graph for this CVE
CVE-2024-30039Windows Remote Access Connection Manager Information Disclosure Vulnerability
CVSS 5.5

-

Patched

Trending graph for this CVE
CVE-2024-28902Windows Remote Access Connection Manager Information Disclosure Vulnerability
CVSS 5.5

-

Patched

Trending graph for this CVE
CVE-2024-28901Windows Remote Access Connection Manager Information Disclosure Vulnerability
CVSS 5.5

-

Patched

Trending graph for this CVE
CVE-2024-28900Windows Remote Access Connection Manager Information Disclosure Vulnerability
CVSS 5.5

-

Patched

Trending graph for this CVE
CVE-2024-27280An issue was discovered in StringIO 3.0.1, as distributed in Ruby 3.0.x through 3.0.6 and 3.1.x through 3.1.4. The ungetbyte and ungetc methods on a StringIO can read past the end of a string, and a subsequent call to StringIO.gets may return the memory value. This vulnerability is not affected StringIO 3.0.3 and later, and Ruby 3.2.x and later. We recommend to update the StringIO gem to version 3.0.3 or later. In order to ensure compatibility with bundled version in older Ruby series, you may update as follows instead: For Ruby 3.0 users: Update to stringio 3.0.1.1 For Ruby 3.1 users: Update to stringio 3.1.0.2 You can use gem update stringio to update it. If you are using bundler, please add gem "stringio", ">= 3.0.1.2" to your Gemfile.
CVSS 9.8Almapay

-

Patched

Trending graph for this CVE
CVE-2024-26255Windows Remote Access Connection Manager Information Disclosure Vulnerability
CVSS 5.5

-

Patched

Trending graph for this CVE
CVE-2024-26243Windows USB Print Driver Elevation of Privilege Vulnerability
CVSS 7

-

Patched

Trending graph for this CVE
CVE-2024-26176Windows Kernel Elevation of Privilege Vulnerability
CVSS 7.8

-

Patched

Trending graph for this CVE
CVE-2024-26160Windows Cloud Files Mini Filter Driver Information Disclosure Vulnerability
CVSS 5.5Microsoft

-

Patched

Trending graph for this CVE
CVE-2024-23364Transient DOS when processing the non-transmitted BSSID profile sub-elements present within the MBSSID Information Element (IE) of a beacon frame that is received from over-the-air (OTA).
CVSS 7.5Qualcomm

-

Patched

Trending graph for this CVE
CVE-2024-23363[HIGH] These vulnerabilities affect Qualcomm closed-source components and are described in further detail in the appropriate Qualcomm security bulletin or security alert. The severity assessment of these issues is provided directly by Qualcomm.
CVSS 7.5Qualcomm

-

Patched

Trending graph for this CVE
CVE-2024-23359[HIGH] These vulnerabilities affect Qualcomm closed-source components and are described in further detail in the appropriate Qualcomm security bulletin or security alert. The severity assessment of these issues is provided directly by Qualcomm.
CVSS 8.2Dell, et al

-

Patched

Trending graph for this CVE
CVE-2024-23358[HIGH] These vulnerabilities affect Qualcomm closed-source components and are described in further detail in the appropriate Qualcomm security bulletin or security alert. The severity assessment of these issues is provided directly by Qualcomm.
CVSS 7.5Qualcomm

-

Patched

Trending graph for this CVE
CVE-2024-23353[HIGH] These vulnerabilities affect Qualcomm closed-source components and are described in further detail in the appropriate Qualcomm security bulletin or security alert. The severity assessment of these issues is provided directly by Qualcomm.
CVSS 7.5Qualcomm

-

Patched

Trending graph for this CVE
CVE-2024-21479Transient DOS during music playback of ALAC content.
CVSS 7.5Dell, et al

-

-

Trending graph for this CVE
CVE-2024-21477[HIGH] These vulnerabilities affect Qualcomm closed-source components and are described in further detail in the appropriate Qualcomm security bulletin or security alert. The severity assessment of these issues is provided directly by Qualcomm.
CVSS 7.5

-

Patched

Trending graph for this CVE
CVE-2024-21467Information disclosure while handling beacon probe frame during scan entry generation in client side.
CVSS 6.5Qualcomm

-

-

Trending graph for this CVE
CVE-2024-21465[HIGH] These vulnerabilities affect Qualcomm closed-source components and are described in further detail in the appropriate Qualcomm security bulletin or security alert. The severity assessment of these issues is provided directly by Qualcomm.
CVSS 7.8Qualcomm

-

Patched

Trending graph for this CVE
CVE-2024-21462[HIGH] These vulnerabilities affect Qualcomm closed-source components and are described in further detail in the appropriate Qualcomm security bulletin or security alert. The severity assessment of these issues is provided directly by Qualcomm.
CVSS 5.5Qualcomm

-

Patched

Trending graph for this CVE
CVE-2024-21459Information disclosure while handling beacon or probe response frame in STA.
CVSS 6.5Dell, et al

-

-

Trending graph for this CVE
CVE-2024-21458Information disclosure while handling SA query action frame.
CVSS 7.5Qualcomm

-

Patched

Trending graph for this CVE
CVE-2024-21457INformation disclosure while handling Multi-link IE in beacon frame.
CVSS 7.5Qualcomm

-

Patched

Trending graph for this CVE
CVE-2024-21456Information Disclosure while parsing beacon frame in STA.
CVSS 9.1Qualcomm

-

Patched

Trending graph for this CVE
CVE-2024-21340Windows Kernel Information Disclosure Vulnerability
CVSS 4.6Microsoft

-

Patched

Trending graph for this CVE
CVE-2024-20290A vulnerability in the OLE2 file format parser of ClamAV could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to an incorrect check for end-of-string values during scanning, which may result in a heap buffer over-read. An attacker could exploit this vulnerability by submitting a crafted file containing OLE2 content to be scanned by ClamAV on an affected device. A successful exploit could allow the attacker to cause the ClamAV scanning process to terminate, resulting in a DoS condition on the affected software and consuming available system resources. For a description of this vulnerability, see the ClamAV blog .
CVSS 7.5Fedoraproject, et al

-

Patched

Trending graph for this CVE
CVE-2023-6992Cloudflare version of zlib library was found to be vulnerable to memory corruption issues affecting the deflation algorithm implementation (deflate.c). The issues resulted from improper input validation and heap-based buffer overflow. A local attacker could exploit the problem during compression using a crafted malicious file potentially leading to denial of service of the software. Patches: The issue has been patched in commit 8352d10 https://github.com/cloudflare/zlib/commit/8352d108c05db1bdc5ac3bdf834dad641694c13c . The upstream repository is not affected.
CVSS 5.5Cloudflare

-

Patched

Trending graph for this CVE
CVE-2023-51773BACnet Stack before 1.3.2 has a decode function APDU buffer over-read in bacapp_decode_application_data in bacapp.c.
CVSS 9.1

-

-

Trending graph for this CVE
CVE-2023-49285Squid is a caching proxy for the Web supporting HTTP, HTTPS, FTP, and more. Due to a Buffer Overread bug Squid is vulnerable to a Denial of Service attack against Squid HTTP Message processing. This bug is fixed by Squid version 6.5. Users are advised to upgrade. There are no known workarounds for this vulnerability.
CVSS 8.6Squid-cache

-

Patched

Trending graph for this CVE
CVE-2023-4758Buffer Over-read in GitHub repository gpac/gpac prior to 2.3-DEV.
CVSS 5.5Gpac

Exploit

Patched

Trending graph for this CVE
CVE-2023-45919Mesa 23.0.4 was discovered to contain a buffer over-read in glXQueryServerString(). NOTE: this is disputed because there are no common situations in which users require uninterrupted operation with an attacker-controller server.
CVSS 5.3

-

-

Trending graph for this CVE
CVE-2023-43555Information disclosure in Video while parsing mp2 clip with invalid section length.
CVSS 8.2

-

-

Trending graph for this CVE
CVE-2023-43539[HIGH] These vulnerabilities affect Qualcomm closed-source components and are described in further detail in the appropriate Qualcomm security bulletin or security alert. The severity assessment of these issues is provided directly by Qualcomm.
CVSS 7.5

-

Patched

Trending graph for this CVE
CVE-2023-43537Information disclosure while handling T2LM Action Frame in WLAN Host.
CVSS 6.5

-

-

Trending graph for this CVE
CVE-2023-43536[HIGH] These vulnerabilities affect Qualcomm closed-source components and are described in further detail in the appropriate Qualcomm security bulletin or security alert. The severity assessment of these issues is provided directly by Qualcomm.
CVSS 7.5Qualcomm

-

Patched

Trending graph for this CVE
CVE-2023-43533[HIGH] These vulnerabilities affect Qualcomm closed-source components and are described in further detail in the appropriate Qualcomm security bulletin or security alert. The severity assessment of these issues is provided directly by Qualcomm.
CVSS 7.5Qualcomm

-

Patched

Trending graph for this CVE
CVE-2023-43528Information disclosure when the ADSP payload size received in HLOS in response to Audio Stream Manager matrix session is less than this expected size.
CVSS 6.1

-

-

Trending graph for this CVE
CVE-2023-43527Information disclosure while parsing dts header atom in Video.
CVSS 6.8

-

-

Trending graph for this CVE
CVE-2023-43512Transient DOS while parsing GATT service data when the total amount of memory that is required by the multiple services is greater than the actual size of the services buffer.
CVSS 7.5Qualcomm

-

Patched

Trending graph for this CVE
CVE-2023-39541A denial of service vulnerability exists in the ICMP and ICMPv6 parsing functionality of Weston Embedded uC-TCP-IP v3.06.01. A specially crafted network packet can lead to an out-of-bounds read. An attacker can send a malicious packet to trigger this vulnerability.
CVSS 5.9Weston-embedded

-

-

Trending graph for this CVE
CVE-2023-39540A denial of service vulnerability exists in the ICMP and ICMPv6 parsing functionality of Weston Embedded uC-TCP-IP v3.06.01. A specially crafted network packet can lead to an out-of-bounds read. An attacker can send a malicious packet to trigger this vulnerability.
CVSS 5.9Weston-embedded

-

-

Trending graph for this CVE
CVE-2023-38172Microsoft Message Queuing Denial of Service Vulnerability
CVSS 7.5Microsoft

-

Patched

Trending graph for this CVE
CVE-2023-38152DHCP Server Service Information Disclosure Vulnerability
CVSS 5.3Microsoft

-

Patched

Trending graph for this CVE
CVE-2023-38144Windows Common Log File System Driver Elevation of Privilege Vulnerability
CVSS 7.8Microsoft

-

Patched

Trending graph for this CVE
CVE-2023-36904Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability
CVSS 7.8Microsoft

-

Patched

Trending graph for this CVE
CVE-2023-36803Windows Kernel Information Disclosure Vulnerability
CVSS 5.5Microsoft

Exploit

Patched

Trending graph for this CVE
CVE-2023-36801DHCP Server Service Information Disclosure Vulnerability
CVSS 5.3Microsoft

-

Patched

Trending graph for this CVE
CVE-2023-367733D Builder Remote Code Execution Vulnerability
CVSS 7.8Microsoft

-

Patched

Trending graph for this CVE
CVE-2023-36581Microsoft Message Queuing Denial of Service Vulnerability
CVSS 7.5Microsoft

-

Patched

Trending graph for this CVE
CVE-2023-36397Windows Pragmatic General Multicast (PGM) Remote Code Execution Vulnerability
CVSS 9.8Microsoft

-

Patched

Trending graph for this CVE
CVE-2023-36392DHCP Server Service Denial of Service Vulnerability
CVSS 7.5Microsoft

-

Patched

Trending graph for this CVE
CVE-2023-35643DHCP Server Service Information Disclosure Vulnerability
CVSS 7.5Microsoft

-

Patched

Trending graph for this CVE
CVE-2023-35638DHCP Server Service Denial of Service Vulnerability
CVSS 7.5Microsoft

-

Patched

Trending graph for this CVE