Security
Headlines
HeadlinesLatestCVEs

Tag

#windows

CVE-2023-36712

Windows Kernel Elevation of Privilege Vulnerability

CVE
#vulnerability#windows
CVE-2023-36603

Windows TCP/IP Denial of Service Vulnerability

CVE-2023-36711

Windows Runtime C++ Template Library Elevation of Privilege Vulnerability

CVE-2023-36584

Windows Mark of the Web Security Feature Bypass Vulnerability

CVE-2023-29348

Windows Remote Desktop Gateway (RD Gateway) Information Disclosure Vulnerability

CVE-2023-36717

Windows Virtual Trusted Platform Module Denial of Service Vulnerability

CVE-2023-36707

Windows Deployment Services Denial of Service Vulnerability

CVE-2023-36706

Windows Deployment Services Information Disclosure Vulnerability

CVE-2023-42794

Incomplete Cleanup vulnerability in Apache Tomcat. The internal fork of Commons FileUpload packaged with Apache Tomcat 9.0.70 through 9.0.80 and 8.5.85 through 8.5.93 included an unreleased, in progress refactoring that exposed a potential denial of service on Windows if a web application opened a stream for an uploaded file but failed to close the stream. The file would never be deleted from disk creating the possibility of an eventual denial of service due to the disk being full. Users are recommended to upgrade to version 9.0.81 onwards or 8.5.94 onwards, which fixes the issue.

CVE-2020-27213: Ethernut Download

An issue was discovered in Ethernut Nut/OS 5.1. The code that generates Initial Sequence Numbers (ISNs) for TCP connections derives the ISN from an insufficiently random source. As a result, an attacker may be able to determine the ISN of current and future TCP connections and either hijack existing ones or spoof future ones. While the ISN generator seems to adhere to RFC 793 (where a global 32-bit counter is incremented roughly every 4 microseconds), proper ISN generation should aim to follow at least the specifications outlined in RFC 6528.