| CVE-2024-2756 |
__Host-/__Secure- cookie bypass due to partial CVE-2022-31629 fix
|
MSRC |
2024‑04‑09 |
Mittel |
| CVE-2024-21409 |
.NET, .NET Framework, and Visual Studio Remote Code Execution Vulnerability
|
MSRC |
2024‑04‑09 |
Hoch |
| CVE-2022-1708 |
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
|
MSRC |
2024‑04‑09 |
Hoch |
| CVE-2022-27649 |
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
|
MSRC |
2024‑04‑09 |
Hoch |
| CVE-2022-27651 |
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
|
MSRC |
2024‑04‑09 |
Mittel |
| CVE-2022-2795 |
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
|
MSRC |
2024‑04‑09 |
Mittel |
| CVE-2022-2995 |
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
|
MSRC |
2024‑04‑09 |
Hoch |
| CVE-2021-3602 |
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
|
MSRC |
2024‑04‑09 |
Mittel |
| CVE-2021-3636 |
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
|
MSRC |
2024‑04‑09 |
Mittel |
| CVE-2022-26691 |
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
|
MSRC |
2024‑04‑09 |
Mittel |
| CVE-2023-42821 |
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
|
MSRC |
2024‑04‑09 |
Hoch |
| CVE-2022-38178 |
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
|
MSRC |
2024‑04‑09 |
Hoch |
| CVE-2022-38177 |
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
|
MSRC |
2024‑04‑09 |
Hoch |
| CVE-2024-27983 |
An attacker can make the Node.js HTTP/2 server completely unavailable by sending a small amount of HTTP/2 frames packets…
|
MSRC |
2024‑04‑09 |
Hoch |
| CVE-2024-26898 |
aoe: fix the potential use-after-free problem in aoecmd_cfg_pkts
|
MSRC |
2024‑04‑09 |
Hoch |
| CVE-2023-38709 |
Apache HTTP Server: HTTP response splitting
|
MSRC |
2024‑04‑09 |
Hoch |
| CVE-2024-24795 |
Apache HTTP Server: HTTP Response Splitting in multiple modules
|
MSRC |
2024‑04‑09 |
Mittel |
| CVE-2024-27316 |
Apache HTTP Server: HTTP/2 DoS by memory exhaustion on endless continuation frames
|
MSRC |
2024‑04‑09 |
Hoch |
| CVE-2024-3660 |
Arbitrary code injection vulnerability in Keras framework < 2.13
|
MSRC |
2024‑04‑09 |
Kritisch |
| CVE-2024-29063 |
Azure AI Search Information Disclosure Vulnerability
|
MSRC |
2024‑04‑09 |
Hoch |
| CVE-2024-28917 |
Azure Arc-enabled Kubernetes Extension Cluster-Scope Elevation of Privilege Vulnerability
|
MSRC |
2024‑04‑09 |
Mittel |
| CVE-2024-21424 |
Azure Compute Gallery Elevation of Privilege Vulnerability
|
MSRC |
2024‑04‑09 |
Mittel |
| CVE-2024-29993 |
Azure CycleCloud Elevation of Privilege Vulnerability
|
MSRC |
2024‑04‑09 |
Hoch |
| CVE-2024-29992 |
Azure Identity Library for .NET Information Disclosure Vulnerability
|
MSRC |
2024‑04‑09 |
Mittel |
| CVE-2024-26193 |
Azure Migrate Remote Code Execution Vulnerability
|
MSRC |
2024‑04‑09 |
Mittel |
| CVE-2024-29989 |
Azure Monitor Agent Elevation of Privilege Vulnerability
|
MSRC |
2024‑04‑09 |
Hoch |
| CVE-2024-20685 |
Azure Private 5G Core Denial of Service Vulnerability
|
MSRC |
2024‑04‑09 |
Mittel |
| CVE-2024-20665 |
BitLocker Security Feature Bypass Vulnerability
|
MSRC |
2024‑04‑09 |
Mittel |
| CVE-2024-26671 |
blk-mq: fix IO hang from sbitmap wakeup race
|
MSRC |
2024‑04‑09 |
Mittel |
| CVE-2024-26886 |
Bluetooth: af_bluetooth: Fix deadlock
|
MSRC |
2024‑04‑09 |
Mittel |
| CVE-2024-26903 |
Bluetooth: rfcomm: Fix null-ptr-deref in rfcomm_check_security
|
MSRC |
2024‑04‑09 |
Mittel |
| CVE-2024-26885 |
bpf: Fix DEVMAP_HASH overflow check on 32-bit arches
|
MSRC |
2024‑04‑09 |
Hoch |
| CVE-2024-26884 |
bpf: Fix hashtab overflow check on 32-bit arches
|
MSRC |
2024‑04‑09 |
Hoch |
| CVE-2024-26883 |
bpf: Fix stackmap overflow check on 32-bit arches
|
MSRC |
2024‑04‑09 |
Hoch |
| CVE-2024-26726 |
btrfs: don't drop extent_map for free space inode on write error
|
MSRC |
2024‑04‑09 |
Mittel |
| CVE-2024-3177 |
Bypassing mountable secrets policy imposed by the ServiceAccount admission plugin
|
MSRC |
2024‑04‑09 |
Niedrig |
| CVE-2024-26828 |
cifs: fix underflow in parse_server_interfaces()
|
MSRC |
2024‑04‑09 |
Mittel |
| CVE-2024-31755 |
cJSON v1.7.17 was discovered to contain a segmentation violation which can trigger through the second parameter of function…
|
MSRC |
2024‑04‑09 |
Hoch |
| CVE-2024-1874 |
Command injection via array-ish $command parameter of proc_open()
|
MSRC |
2024‑04‑09 |
Kritisch |
| CVE-2024-0874 |
Coredns: cd bit response is cached and served later
|
MSRC |
2024‑04‑09 |
Mittel |
| CVE-2024-3154 |
Cri-o: arbitrary command injection via pod annotation
|
MSRC |
2024‑04‑09 |
Hoch |
| CVE-2024-26789 |
crypto: arm64/neonbs - fix out-of-bounds access on short input
|
MSRC |
2024‑04‑09 |
Hoch |
| CVE-2024-26212 |
DHCP Server Service Denial of Service Vulnerability
|
MSRC |
2024‑04‑09 |
Hoch |
| CVE-2024-26215 |
DHCP Server Service Denial of Service Vulnerability
|
MSRC |
2024‑04‑09 |
Hoch |
| CVE-2024-26195 |
DHCP Server Service Remote Code Execution Vulnerability
|
MSRC |
2024‑04‑09 |
Hoch |
| CVE-2024-26202 |
DHCP Server Service Remote Code Execution Vulnerability
|
MSRC |
2024‑04‑09 |
Hoch |
| CVE-2024-26718 |
dm-crypt, dm-verity: disable tasklets
|
MSRC |
2024‑04‑09 |
Mittel |
| CVE-2024-26901 |
do_sys_name_to_handle(): use kzalloc() to fix kernel-infoleak
|
MSRC |
2024‑04‑09 |
Mittel |
| CVE-2024-26661 |
drm/amd/display: Add NULL test for 'timing generator' in 'dcn21_set_pipe()'
|
MSRC |
2024‑04‑09 |
Mittel |
| CVE-2024-26662 |
drm/amd/display: Fix 'panel_cntl' could be null in 'dcn21_set_backlight_level()'
|
MSRC |
2024‑04‑09 |
Mittel |