A division-by-zero error on some AMD processors can potentially return speculative data resulting in loss of confidentiality.
5.5CVSS
6.7AI Score
0.0005EPSS
7.8CVSS
8.2AI Score
0.001EPSS
Bluetooth BR/EDR devices with Secure Simple Pairing and Secure Connections pairing in Bluetooth Core Specification 4.2 through 5.4 allow certain man-in-the-middle attacks that force a short key length, and might lead to discovery of the encryption key and live injection, aka BLUFFS.
6.8CVSS
6.8AI Score
0.003EPSS
8.1CVSS
8.8AI Score
0.019EPSS
8.8CVSS
8.7AI Score
0.001EPSS
7.8CVSS
8AI Score
0.0005EPSS
8.8CVSS
9.1AI Score
0.001EPSS
5.5CVSS
6.2AI Score
0.001EPSS
8.8CVSS
9AI Score
0.084EPSS
8.8CVSS
9AI Score
0.001EPSS
6.5CVSS
7.5AI Score
0.001EPSS
7.8CVSS
8AI Score
0.0005EPSS
7.3CVSS
7.4AI Score
0.007EPSS
Windows DPAPI (Data Protection Application Programming Interface) Spoofing Vulnerability
7.5CVSS
7.5AI Score
0.002EPSS
8.1CVSS
8.1AI Score
0.002EPSS
8.8CVSS
9.2AI Score
0.084EPSS
7.8CVSS
8AI Score
0.0005EPSS
8.8CVSS
8.5AI Score
0.009EPSS
Microsoft Protected Extensible Authentication Protocol (PEAP) Remote Code Execution Vulnerability
9.8CVSS
9.4AI Score
0.542EPSS
7.1CVSS
7.2AI Score
0.0005EPSS
7.8CVSS
8AI Score
0.0005EPSS
7.8CVSS
8.1AI Score
0.0005EPSS
7.8CVSS
8.2AI Score
0.001EPSS
7.8CVSS
7.9AI Score
0.001EPSS
9.8CVSS
9.5AI Score
0.016EPSS
6.5CVSS
6.6AI Score
0.0005EPSS
7.1CVSS
8AI Score
0.0005EPSS
8.8CVSS
9AI Score
0.0005EPSS
7.2CVSS
7.4AI Score
0.005EPSS
8.8CVSS
9.2AI Score
0.063EPSS
7CVSS
7.2AI Score
0.001EPSS
5.5CVSS
5.9AI Score
0.0005EPSS
7CVSS
7.2AI Score
0.0005EPSS
5.5CVSS
5.9AI Score
0.0005EPSS
7.8CVSS
8AI Score
0.012EPSS
7.8CVSS
7.9AI Score
0.0005EPSS
8.8CVSS
8.9AI Score
0.007EPSS
7.8CVSS
8.4AI Score
0.012EPSS
8CVSS
8.2AI Score
0.019EPSS
7CVSS
7.2AI Score
0.0005EPSS
Microsoft Local Security Authority Subsystem Service Information Disclosure Vulnerability
5.5CVSS
5.9AI Score
0.0005EPSS
7.8CVSS
8AI Score
0.0005EPSS
7.8CVSS
7.9AI Score
0.0005EPSS
Microsoft Speech Application Programming Interface (SAPI) Elevation of Privilege Vulnerability
7.8CVSS
7.9AI Score
0.0005EPSS
When curl retrieves an HTTP response, it stores the incoming headers so thatthey can be accessed later via the libcurl headers API. However, curl did not have a limit in how many or how large headers it wouldaccept in a response, allowing a malicious server to stream an endless seriesof headers and...
7.5CVSS
7.5AI Score
0.014EPSS
This flaw makes curl overflow a heap based buffer in the SOCKS5 proxyhandshake. When curl is asked to pass along the host name to the SOCKS5 proxy to allowthat to resolve the address instead of it getting done by curl itself, themaximum length that host name can be is 255 bytes. If the host name is...
9.8CVSS
9.6AI Score
0.003EPSS