Show filters
436 Total Results
Displaying 11-20 of 436
Sort by:
Attacker Value
Unknown

CVE-2023-20676

Disclosure Date: April 06, 2023 (last updated October 08, 2023)
In wlan, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07588569; Issue ID: ALPS07628518.
Attacker Value
Unknown

CVE-2023-20675

Disclosure Date: April 06, 2023 (last updated October 08, 2023)
In wlan, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07588569; Issue ID: ALPS07588569.
Attacker Value
Unknown

CVE-2023-20674

Disclosure Date: April 06, 2023 (last updated October 08, 2023)
In wlan, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07588569; Issue ID: ALPS07588552.
Attacker Value
Unknown

CVE-2023-20663

Disclosure Date: April 06, 2023 (last updated October 08, 2023)
In wlan, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07560741; Issue ID: ALPS07560741.
Attacker Value
Unknown

CVE-2023-20662

Disclosure Date: April 06, 2023 (last updated October 08, 2023)
In wlan, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07560765; Issue ID: ALPS07560765.
Attacker Value
Unknown

CVE-2023-20661

Disclosure Date: April 06, 2023 (last updated October 08, 2023)
In wlan, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07560782; Issue ID: ALPS07560782.
Attacker Value
Unknown

CVE-2023-20660

Disclosure Date: April 06, 2023 (last updated October 08, 2023)
In wlan, there is a possible out of bounds read due to an integer overflow. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07588383; Issue ID: ALPS07588383.
Attacker Value
Unknown

CVE-2023-20659

Disclosure Date: April 06, 2023 (last updated October 08, 2023)
In wlan, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07588413; Issue ID: ALPS07588413.
Attacker Value
Unknown

CVE-2019-14835

Disclosure Date: September 17, 2019 (last updated December 16, 2023)
A buffer overflow flaw was found, in versions from 2.6.34 to 5.2.x, in the way Linux kernel's vhost functionality that translates virtqueue buffers to IOVs, logged the buffer descriptors during migration. A privileged guest user able to pass descriptors with invalid length to the host when migration is underway, could use this flaw to increase their privileges on the host.
Attacker Value
Unknown

CVE-2019-11479

Disclosure Date: June 19, 2019 (last updated November 08, 2023)
Jonathan Looney discovered that the Linux kernel default MSS is hard-coded to 48 bytes. This allows a remote peer to fragment TCP resend queues significantly more than if a larger MSS were enforced. A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commits 967c05aee439e6e5d7d805e195b3a20ef5c433d6 and 5f3e2bf008c2221478101ee72f5cb4654b9fc363.