Show filters
2,371 Total Results
Displaying 181-190 of 2,371
Sort by:
Attacker Value
Unknown

CVE-2023-22015

Disclosure Date: October 17, 2023 (last updated December 23, 2023)
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 5.7.42 and prior and 8.0.31 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
Attacker Value
Unknown

CVE-2023-40791

Disclosure Date: October 16, 2023 (last updated January 05, 2024)
extract_user_to_sg in lib/scatterlist.c in the Linux kernel before 6.4.12 fails to unpin pages in a certain situation, as demonstrated by a WARNING for try_grab_page.
Attacker Value
Unknown

CVE-2023-45862

Disclosure Date: October 14, 2023 (last updated January 09, 2024)
An issue was discovered in drivers/usb/storage/ene_ub6250.c for the ENE UB6250 reader driver in the Linux kernel before 6.2.5. An object could potentially extend beyond the end of an allocation.
Attacker Value
Unknown

CVE-2023-27316

Disclosure Date: October 12, 2023 (last updated February 14, 2025)
SnapCenter versions 4.8 through 4.9 are susceptible to a vulnerability which may allow an authenticated SnapCenter Server user to become an admin user on a remote system where a SnapCenter plug-in has been installed.
Attacker Value
Unknown

CVE-2023-27314

Disclosure Date: October 12, 2023 (last updated October 19, 2023)
ONTAP 9 versions prior to 9.8P19, 9.9.1P16, 9.10.1P12, 9.11.1P8, 9.12.1P2 and 9.13.1 are susceptible to a vulnerability which could allow a remote unauthenticated attacker to cause a crash of the HTTP service.
Attacker Value
Unknown

CVE-2023-27313

Disclosure Date: October 12, 2023 (last updated October 19, 2023)
SnapCenter versions 3.x and 4.x prior to 4.9 are susceptible to a vulnerability which may allow an authenticated unprivileged user to gain access as an admin user.
Attacker Value
Unknown

CVE-2023-27312

Disclosure Date: October 12, 2023 (last updated October 19, 2023)
SnapCenter Plugin for VMware vSphere versions 4.6 prior to 4.9 are susceptible to a vulnerability which may allow authenticated unprivileged users to modify email and snapshot name settings within the VMware vSphere user interface.
Attacker Value
Unknown

CVE-2023-27315

Disclosure Date: October 12, 2023 (last updated October 17, 2023)
SnapGathers versions prior to 4.9 are susceptible to a vulnerability which could allow a local authenticated attacker to discover plaintext domain user credentials
Attacker Value
Unknown

CVE-2023-39325

Disclosure Date: October 11, 2023 (last updated January 21, 2024)
A malicious HTTP/2 client which rapidly creates requests and immediately resets them can cause excessive server resource consumption. While the total number of requests is bounded by the http2.Server.MaxConcurrentStreams setting, resetting an in-progress request allows the attacker to create a new request while the existing one is still executing. With the fix applied, HTTP/2 servers now bound the number of simultaneously executing handler goroutines to the stream concurrency limit (MaxConcurrentStreams). New requests arriving when at the limit (which can only happen after the client has reset an existing, in-flight request) will be queued until a handler exits. If the request queue grows too large, the server will terminate the connection. This issue is also fixed in golang.org/x/net/http2 for users manually configuring HTTP/2. The default stream concurrency limit is 250 streams (requests) per HTTP/2 connection. This value may be adjusted using the golang.org/x/net/http2 package; see…
Attacker Value
Unknown

CVE-2023-40745

Disclosure Date: October 05, 2023 (last updated April 30, 2024)
LibTIFF is vulnerable to an integer overflow. This flaw allows remote attackers to cause a denial of service (application crash) or possibly execute an arbitrary code via a crafted tiff image, which triggers a heap-based buffer overflow.