Neueste Warnungen
| CVE-2023-36049 |
.NET, .NET Framework, and Visual Studio Elevation of Privilege Vulnerability
|
MSRC | 2026‑02‑21 | Hoch |
| CVE-2023-5345 |
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
|
MSRC | 2026‑02‑21 | Hoch |
| CVE-2023-34059 |
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
|
MSRC | 2026‑02‑21 | Hoch |
| CVE-2023-5717 |
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
|
MSRC | 2026‑02‑21 | Hoch |
| CVE-2022-27664 |
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
|
MSRC | 2026‑02‑21 | Hoch |
| CVE-2023-5633 |
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
|
MSRC | 2026‑02‑21 | Hoch |
| CVE-2023-48105 |
An heap overflow vulnerability was discovered in Bytecode alliance wasm-micro-runtime v.1.2.3 allows a remote attacker to cause a denial of service via the wasm_loader_prepare_bytecode function in core/iwasm/interpreter/wasm_loader.c.
|
MSRC | 2026‑02‑21 | Hoch |
| CVE-2023-47235 |
An issue was discovered in FRRouting FRR through 9.0.1. A crash can occur when a malformed BGP UPDATE message with an EOR is processed because the presence of EOR does not lead to a treat-as-withdraw outcome.
|
MSRC | 2026‑02‑21 | Hoch |
| CVE-2023-47234 |
An issue was discovered in FRRouting FRR through 9.0.1. A crash can occur when processing a crafted BGP UPDATE message with a MP_UNREACH_NLRI attribute and additional NLRI data (that lacks mandatory path attributes).
|
MSRC | 2026‑02‑21 | Hoch |
| CVE-2023-36038 |
ASP.NET Core Denial of Service Vulnerability
|
MSRC | 2026‑02‑21 | Hoch |
| CVE-2023-36560 |
ASP.NET Security Feature Bypass Vulnerability
|
MSRC | 2026‑02‑21 | Hoch |
| CVE-2023-36052 |
Azure CLI REST Command Information Disclosure Vulnerability
|
MSRC | 2026‑02‑21 | Hoch |
| CVE-2023-36437 |
Azure DevOps Server Remote Code Execution Vulnerability
|
MSRC | 2026‑02‑21 | Hoch |
| CVE-2023-48161 |
Buffer Overflow vulnerability in GifLib Project GifLib v.5.2.1 allows a local attacker to obtain sensitive information via the DumpSCreen2RGB function in gif2rgb.c
|
MSRC | 2026‑02‑21 | Hoch |
| CVE-2023-36392 |
DHCP Server Service Denial of Service Vulnerability
|
MSRC | 2026‑02‑21 | Hoch |
| CVE-2023-47108 |
DoS vulnerability in otelgrpc (uncontrolled resource consumption) due to unbound cardinality metrics
|
MSRC | 2026‑02‑21 | Hoch |
| CVE-2023-45539 |
HAProxy before 2.8.2 accepts # as part of the URI component, which might allow remote attackers to obtain sensitive information or have unspecified other impact upon misinterpretation of a path_end rule, such as routing index.html#.png to a static server.
|
MSRC | 2026‑02‑21 | Hoch |
| CVE-2023-45283 |
Insecure parsing of Windows paths with a \??\ prefix in path/filepath
|
MSRC | 2026‑02‑21 | Hoch |
| CVE-2023-5972 |
Kernel: the nfta_inner_num and nfta_expr_name netlink attributes accessed without checking its presence in nft_inner.c
|
MSRC | 2026‑02‑21 | Hoch |
| CVE-2023-5178 |
Kernel: use after free in nvmet_tcp_free_crypto in nvme
|
MSRC | 2026‑02‑21 | Hoch |
| CVE-2023-5528 |
Kubernetes - Windows nodes - Insufficient input sanitization in in-tree storage plugin leads to privilege escalation
|
MSRC | 2026‑02‑21 | Hoch |
| CVE-2023-36410 |
Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability
|
MSRC | 2026‑02‑21 | Hoch |
| CVE-2023-36031 |
Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability
|
MSRC | 2026‑02‑21 | Hoch |
| CVE-2023-36024 |
Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability
|
MSRC | 2026‑02‑21 | Hoch |
| CVE-2023-36027 |
Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability
|
MSRC | 2026‑02‑21 | Hoch |
| CVE-2023-36034 |
Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability
|
MSRC | 2026‑02‑21 | Hoch |
| CVE-2023-36014 |
Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability
|
MSRC | 2026‑02‑21 | Hoch |
| CVE-2023-36041 |
Microsoft Excel Remote Code Execution Vulnerability
|
MSRC | 2026‑02‑21 | Hoch |
| CVE-2023-36037 |
Microsoft Excel Security Feature Bypass Vulnerability
|
MSRC | 2026‑02‑21 | Hoch |
| CVE-2023-36439 |
Microsoft Exchange Server Remote Code Execution Vulnerability
|
MSRC | 2026‑02‑21 | Hoch |
| CVE-2023-36050 |
Microsoft Exchange Server Spoofing Vulnerability
|
MSRC | 2026‑02‑21 | Hoch |
| CVE-2023-36039 |
Microsoft Exchange Server Spoofing Vulnerability
|
MSRC | 2026‑02‑21 | Hoch |
| CVE-2023-36035 |
Microsoft Exchange Server Spoofing Vulnerability
|
MSRC | 2026‑02‑21 | Hoch |
| CVE-2023-38151 |
Microsoft Host Integration Server 2020 Remote Code Execution Vulnerability
|
MSRC | 2026‑02‑21 | Hoch |
| CVE-2023-36045 |
Microsoft Office Graphics Remote Code Execution Vulnerability
|
MSRC | 2026‑02‑21 | Hoch |
| CVE-2023-36021 |
Microsoft On-Prem Data Gateway Security Feature Bypass Vulnerability
|
MSRC | 2026‑02‑21 | Hoch |
| CVE-2023-36423 |
Microsoft Remote Registry Service Remote Code Execution Vulnerability
|
MSRC | 2026‑02‑21 | Hoch |
| CVE-2023-36401 |
Microsoft Remote Registry Service Remote Code Execution Vulnerability
|
MSRC | 2026‑02‑21 | Hoch |
| CVE-2023-36007 |
Microsoft Send Customer Voice survey from Dynamics 365 Spoofing Vulnerability
|
MSRC | 2026‑02‑21 | Hoch |
| CVE-2023-36719 |
Microsoft Speech Application Programming Interface (SAPI) Elevation of Privilege Vulnerability
|
MSRC | 2026‑02‑21 | Hoch |
| CVE-2023-36402 |
Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
|
MSRC | 2026‑02‑21 | Hoch |
| CVE-2023-36422 |
Microsoft Windows Defender Elevation of Privilege Vulnerability
|
MSRC | 2026‑02‑21 | Hoch |
| CVE-2023-5408 |
Openshift: modification of node role labels
|
MSRC | 2026‑02‑21 | Hoch |
| CVE-2023-44398 |
Out-of-bounds write in exiv2
|
MSRC | 2026‑02‑21 | Hoch |
| CVE-2023-47627 |
Request smuggling in aiohttp
|
MSRC | 2026‑02‑21 | Hoch |
| CVE-2023-46847 |
Squid: denial of service in http digest authentication
|
MSRC | 2026‑02‑21 | Hoch |
| CVE-2023-5824 |
Squid: dos against http and https
|
MSRC | 2026‑02‑21 | Hoch |
| CVE-2023-6111 |
Use-after-free in Linux kernel's netfilter: nf_tables component
|
MSRC | 2026‑02‑21 | Hoch |
| CVE-2023-1194 |
Use-after-free in parse_lease_state()
|
MSRC | 2026‑02‑21 | Hoch |
| CVE-2023-36018 |
Visual Studio Code Jupyter Extension Spoofing Vulnerability
|
MSRC | 2026‑02‑21 | Hoch |
Seite 1