Show filters
410 Total Results
Displaying 141-150 of 410
Sort by:
Attacker Value
Unknown
CVE-2024-23280
Disclosure Date: March 08, 2024 (last updated December 21, 2024)
An injection issue was addressed with improved validation. This issue is fixed in Safari 17.4, macOS Sonoma 14.4, iOS 17.4 and iPadOS 17.4, watchOS 10.4, tvOS 17.4. A maliciously crafted webpage may be able to fingerprint the user.
0
Attacker Value
Unknown
CVE-2024-23263
Disclosure Date: March 08, 2024 (last updated December 21, 2024)
A logic issue was addressed with improved validation. This issue is fixed in tvOS 17.4, macOS Sonoma 14.4, visionOS 1.1, iOS 17.4 and iPadOS 17.4, watchOS 10.4, iOS 16.7.6 and iPadOS 16.7.6, Safari 17.4. Processing maliciously crafted web content may prevent Content Security Policy from being enforced.
0
Attacker Value
Unknown
CVE-2024-1931
Disclosure Date: March 07, 2024 (last updated December 18, 2024)
NLnet Labs Unbound version 1.18.0 up to and including version 1.19.1 contain a vulnerability that can cause denial of service by a certain code path that can lead to an infinite loop. Unbound 1.18.0 introduced a feature that removes EDE records from responses with size higher than the client's advertised buffer size. Before removing all the EDE records however, it would try to see if trimming the extra text fields on those records would result in an acceptable size while still retaining the EDE codes. Due to an unchecked condition, the code that trims the text of the EDE records could loop indefinitely. This happens when Unbound would reply with attached EDE information on a positive reply and the client's buffer size is smaller than the needed space to include EDE records. The vulnerability can only be triggered when the 'ede: yes' option is used; non default configuration. From version 1.19.2 on, the code is fixed to avoid looping indefinitely.
0
Attacker Value
Unknown
CVE-2024-28084
Disclosure Date: March 03, 2024 (last updated January 12, 2025)
p2putil.c in iNet wireless daemon (IWD) through 2.15 allows attackers to cause a denial of service (daemon crash) or possibly have unspecified other impact because of initialization issues in situations where parsing of advertised service information fails.
0
Attacker Value
Unknown
CVE-2024-24246
Disclosure Date: February 29, 2024 (last updated April 02, 2024)
Heap Buffer Overflow vulnerability in qpdf 11.9.0 allows attackers to crash the application via the std::__shared_count() function at /bits/shared_ptr_base.h.
0
Attacker Value
Unknown
CVE-2024-1939
Disclosure Date: February 29, 2024 (last updated December 20, 2024)
Type Confusion in V8 in Google Chrome prior to 122.0.6261.94 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
0
Attacker Value
Unknown
CVE-2024-1938
Disclosure Date: February 29, 2024 (last updated December 20, 2024)
Type Confusion in V8 in Google Chrome prior to 122.0.6261.94 allowed a remote attacker to potentially exploit object corruption via a crafted HTML page. (Chromium security severity: High)
0
Attacker Value
Unknown
CVE-2024-24568
Disclosure Date: February 26, 2024 (last updated December 20, 2024)
Suricata is a network Intrusion Detection System, Intrusion Prevention System and Network Security Monitoring engine. Prior to 7.0.3, the rules inspecting HTTP2 headers can get bypassed by crafted traffic. The vulnerability has been patched in 7.0.3.
0
Attacker Value
Unknown
CVE-2024-23839
Disclosure Date: February 26, 2024 (last updated December 20, 2024)
Suricata is a network Intrusion Detection System, Intrusion Prevention System and Network Security Monitoring engine. Prior to 7.0.3, specially crafted traffic can cause a heap use after free if the ruleset uses the http.request_header or http.response_header keyword. The vulnerability has been patched in 7.0.3. To work around the vulnerability, avoid the http.request_header and http.response_header keywords.
0
Attacker Value
Unknown
CVE-2024-23837
Disclosure Date: February 26, 2024 (last updated February 08, 2025)
LibHTP is a security-aware parser for the HTTP protocol. Crafted traffic can cause excessive processing time of HTTP headers, leading to denial of service. This issue is addressed in 0.5.46.
0