Security
Headlines
HeadlinesLatestCVEs

Tag

#dos

CVE-2023-28298

Windows Kernel Denial of Service Vulnerability

CVE
#vulnerability#windows#dos
CVE-2023-21769

Microsoft Message Queuing Denial of Service Vulnerability

CVE-2023-24860

Microsoft Defender Denial of Service Vulnerability

CVE-2023-26555: ntp-4.2.8p15-cves/CVE-2023-26555 at main · spwpun/ntp-4.2.8p15-cves

praecis_parse in ntpd/refclock_palisade.c in NTP 4.2.8p15 has an out-of-bounds write. Any attack method would be complex, e.g., with a manipulated GPS receiver.

CVE-2023-28241

Windows Secure Socket Tunneling Protocol (SSTP) Denial of Service Vulnerability

CVE-2023-28217

Windows Network Address Translation (NAT) Denial of Service Vulnerability

CVE-2023-24931

Windows Secure Channel Denial of Service Vulnerability

CVE-2023-28234

Windows Secure Channel Denial of Service Vulnerability

CVE-2023-28233

Windows Secure Channel Denial of Service Vulnerability

GHSA-7hj9-rv74-5g92: Traefik HTTP header parsing could cause a denial of service

### Impact There is a vulnerability in [Go when parsing the HTTP headers](https://groups.google.com/g/golang-announce/c/Xdv6JL9ENs8/m/OV40vnafAwAJ), which impacts Traefik. HTTP header parsing could allocate substantially more memory than required to hold the parsed headers. This behavior could be exploited to cause a denial of service. ### References - [CVE-2023-24534](https://www.cve.org/CVERecord?id=CVE-2023-24534) ### Patches - https://github.com/traefik/traefik/releases/tag/v2.9.10 - https://github.com/traefik/traefik/releases/tag/v2.10.0-rc2 ### Workarounds No workaround. ### For more information If you have any questions or comments about this advisory, please [open an issue](https://github.com/traefik/traefik/issues).