Show filters
287 Total Results
Displaying 11-20 of 287
Sort by:
Attacker Value
Unknown
CVE-2023-38431
Disclosure Date: July 18, 2023 (last updated June 19, 2024)
An issue was discovered in the Linux kernel before 6.3.8. fs/smb/server/connection.c in ksmbd does not validate the relationship between the NetBIOS header's length field and the SMB header sizes, via pdu_size in ksmbd_conn_handler_loop, leading to an out-of-bounds read.
0
Attacker Value
Unknown
CVE-2023-38430
Disclosure Date: July 18, 2023 (last updated June 19, 2024)
An issue was discovered in the Linux kernel before 6.3.9. ksmbd does not validate the SMB request protocol ID, leading to an out-of-bounds read.
0
Attacker Value
Unknown
CVE-2023-38428
Disclosure Date: July 18, 2023 (last updated December 16, 2023)
An issue was discovered in the Linux kernel before 6.3.4. fs/ksmbd/smb2pdu.c in ksmbd does not properly check the UserName value because it does not consider the address of security buffer, leading to an out-of-bounds read.
0
Attacker Value
Unknown
CVE-2023-38426
Disclosure Date: July 18, 2023 (last updated December 23, 2023)
An issue was discovered in the Linux kernel before 6.3.4. ksmbd has an out-of-bounds read in smb2_find_context_vals when create_context's name_len is larger than the tag length.
0
Attacker Value
Unknown
CVE-2023-32254
Disclosure Date: July 10, 2023 (last updated August 22, 2024)
A flaw was found in the Linux kernel's ksmbd, a high-performance in-kernel SMB server. The specific flaw exists within the processing of SMB2_TREE_DISCONNECT commands. The issue results from the lack of proper locking when performing operations on an object. An attacker can leverage this vulnerability to execute code in the context of the kernel.
0
Attacker Value
Unknown
CVE-2023-2007
Disclosure Date: April 24, 2023 (last updated February 01, 2024)
The specific flaw exists within the DPT I2O Controller driver. The issue results from the lack of proper locking when performing operations on an object. An attacker can leverage this in conjunction with other vulnerabilities to escalate privileges and execute arbitrary code in the context of the kernel.
0
Attacker Value
Unknown
CVE-2022-43680
Disclosure Date: October 24, 2022 (last updated November 10, 2023)
In libexpat through 2.4.9, there is a use-after free caused by overeager destruction of a shared DTD in XML_ExternalEntityParserCreate in out-of-memory situations.
0
Attacker Value
Unknown
CVE-2022-35252
Disclosure Date: September 23, 2022 (last updated March 28, 2024)
When curl is used to retrieve and parse cookies from a HTTP(S) server, itaccepts cookies using control codes that when later are sent back to a HTTPserver might make the server return 400 responses. Effectively allowing a"sister site" to deny service to all siblings.
0
Attacker Value
Unknown
CVE-2021-4209
Disclosure Date: August 24, 2022 (last updated November 29, 2024)
A NULL pointer dereference flaw was found in GnuTLS. As Nettle's hash update functions internally call memcpy, providing zero-length input may cause undefined behavior. This flaw leads to a denial of service after authentication in rare circumstances.
0
Attacker Value
Unknown
CVE-2022-37434
Disclosure Date: August 05, 2022 (last updated November 29, 2024)
zlib through 1.2.12 has a heap-based buffer over-read or buffer overflow in inflate in inflate.c via a large gzip header extra field. NOTE: only applications that call inflateGetHeader are affected. Some common applications bundle the affected zlib source code but may be unable to call inflateGetHeader (e.g., see the nodejs/node reference).
0