Show filters
154 Total Results
Displaying 11-20 of 154
Sort by:
Attacker Value
Unknown
CVE-2023-36054
Disclosure Date: August 07, 2023 (last updated November 15, 2023)
lib/kadm5/kadm_rpc_xdr.c in MIT Kerberos 5 (aka krb5) before 1.20.2 and 1.21.x before 1.21.1 frees an uninitialized pointer. A remote authenticated user can trigger a kadmind crash. This occurs because _xdr_kadm5_principal_ent_rec does not validate the relationship between n_key_data and the key_data array count.
0
Attacker Value
Unknown
CVE-2023-37920
Disclosure Date: July 25, 2023 (last updated February 14, 2025)
Certifi is a curated collection of Root Certificates for validating the trustworthiness of SSL certificates while verifying the identity of TLS hosts. Certifi prior to version 2023.07.22 recognizes "e-Tugra" root certificates. e-Tugra's root certificates were subject to an investigation prompted by reporting of security issues in their systems. Certifi 2023.07.22 removes root certificates from "e-Tugra" from the root store.
0
Attacker Value
Unknown
CVE-2023-2975
Disclosure Date: July 14, 2023 (last updated October 14, 2024)
Issue summary: The AES-SIV cipher implementation contains a bug that causes
it to ignore empty associated data entries which are unauthenticated as
a consequence.
Impact summary: Applications that use the AES-SIV algorithm and want to
authenticate empty data entries as associated data can be misled by removing,
adding or reordering such empty entries as these are ignored by the OpenSSL
implementation. We are currently unaware of any such applications.
The AES-SIV algorithm allows for authentication of multiple associated
data entries along with the encryption. To authenticate empty data the
application has to call EVP_EncryptUpdate() (or EVP_CipherUpdate()) with
NULL pointer as the output buffer and 0 as the input buffer length.
The AES-SIV implementation in OpenSSL just returns success for such a call
instead of performing the associated data authentication operation.
The empty data thus will not be authenticated.
As this issue does not affect non-empty associated data authenticat…
0
Attacker Value
Unknown
CVE-2023-24329
Disclosure Date: February 17, 2023 (last updated October 08, 2023)
An issue in the urllib.parse component of Python before 3.11.4 allows attackers to bypass blocklisting methods by supplying a URL that starts with blank characters.
0
Attacker Value
Unknown
CVE-2022-23491
Disclosure Date: December 07, 2022 (last updated February 13, 2025)
Certifi is a curated collection of Root Certificates for validating the trustworthiness of SSL certificates while verifying the identity of TLS hosts. Certifi 2022.12.07 removes root certificates from "TrustCor" from the root store. These are in the process of being removed from Mozilla's trust store. TrustCor's root certificates are being removed pursuant to an investigation prompted by media reporting that TrustCor's ownership also operated a business that produced spyware. Conclusions of Mozilla's investigation can be found in the linked google group discussion.
0
Attacker Value
Unknown
CVE-2022-37967
Disclosure Date: November 09, 2022 (last updated January 11, 2025)
Windows Kerberos Elevation of Privilege Vulnerability
0
Attacker Value
Unknown
CVE-2022-38023
Disclosure Date: November 09, 2022 (last updated January 11, 2025)
Netlogon RPC Elevation of Privilege Vulnerability
0
Attacker Value
Unknown
CVE-2022-37966
Disclosure Date: November 09, 2022 (last updated January 11, 2025)
Windows Kerberos RC4-HMAC Elevation of Privilege Vulnerability
0
Attacker Value
Unknown
CVE-2022-45061
Disclosure Date: November 09, 2022 (last updated November 08, 2023)
An issue was discovered in Python before 3.11.1. An unnecessary quadratic algorithm exists in one path when processing some inputs to the IDNA (RFC 3490) decoder, such that a crafted, unreasonably long name being presented to the decoder could lead to a CPU denial of service. Hostnames are often supplied by remote servers that could be controlled by a malicious actor; in such a scenario, they could trigger excessive CPU consumption on the client attempting to make use of an attacker-supplied supposed hostname. For example, the attack payload could be placed in the Location header of an HTTP response with status code 302. A fix is planned in 3.11.1, 3.10.9, 3.9.16, 3.8.16, and 3.7.16.
0
Attacker Value
Unknown
CVE-2022-35252
Disclosure Date: September 23, 2022 (last updated March 28, 2024)
When curl is used to retrieve and parse cookies from a HTTP(S) server, itaccepts cookies using control codes that when later are sent back to a HTTPserver might make the server return 400 responses. Effectively allowing a"sister site" to deny service to all siblings.
0