Show filters
164 Total Results
Displaying 21-30 of 164
Sort by:
Attacker Value
Unknown

CVE-2023-37920

Disclosure Date: July 25, 2023 (last updated February 14, 2025)
Certifi is a curated collection of Root Certificates for validating the trustworthiness of SSL certificates while verifying the identity of TLS hosts. Certifi prior to version 2023.07.22 recognizes "e-Tugra" root certificates. e-Tugra's root certificates were subject to an investigation prompted by reporting of security issues in their systems. Certifi 2023.07.22 removes root certificates from "e-Tugra" from the root store.
Attacker Value
Unknown

CVE-2023-38403

Disclosure Date: July 17, 2023 (last updated January 09, 2024)
iperf3 before 3.14 allows peers to cause an integer overflow and heap corruption via a crafted length field.
Attacker Value
Unknown

CVE-2023-2975

Disclosure Date: July 14, 2023 (last updated October 14, 2024)
Issue summary: The AES-SIV cipher implementation contains a bug that causes it to ignore empty associated data entries which are unauthenticated as a consequence. Impact summary: Applications that use the AES-SIV algorithm and want to authenticate empty data entries as associated data can be misled by removing, adding or reordering such empty entries as these are ignored by the OpenSSL implementation. We are currently unaware of any such applications. The AES-SIV algorithm allows for authentication of multiple associated data entries along with the encryption. To authenticate empty data the application has to call EVP_EncryptUpdate() (or EVP_CipherUpdate()) with NULL pointer as the output buffer and 0 as the input buffer length. The AES-SIV implementation in OpenSSL just returns success for such a call instead of performing the associated data authentication operation. The empty data thus will not be authenticated. As this issue does not affect non-empty associated data authenticat…
Attacker Value
Unknown

CVE-2023-24329

Disclosure Date: February 17, 2023 (last updated October 08, 2023)
An issue in the urllib.parse component of Python before 3.11.4 allows attackers to bypass blocklisting methods by supplying a URL that starts with blank characters.
Attacker Value
Unknown

CVE-2023-0361

Disclosure Date: February 15, 2023 (last updated October 08, 2023)
A timing side-channel in the handling of RSA ClientKeyExchange messages was discovered in GnuTLS. This side-channel can be sufficient to recover the key encrypted in the RSA ciphertext across a network in a Bleichenbacher style attack. To achieve a successful decryption the attacker would need to send a large amount of specially crafted messages to the vulnerable server. By recovering the secret from the ClientKeyExchange message, the attacker would be able to decrypt the application data exchanged over that connection.
Attacker Value
Unknown

CVE-2023-25136

Disclosure Date: February 03, 2023 (last updated February 28, 2024)
OpenSSH server (sshd) 9.1 introduced a double-free vulnerability during options.kex_algorithms handling. This is fixed in OpenSSH 9.2. The double free can be leveraged, by an unauthenticated remote attacker in the default configuration, to jump to any location in the sshd address space. One third-party report states "remote code execution is theoretically possible."
Attacker Value
Unknown

CVE-2022-4292

Disclosure Date: December 05, 2022 (last updated October 08, 2023)
Use After Free in GitHub repository vim/vim prior to 9.0.0882.
Attacker Value
Unknown

CVE-2022-40303

Disclosure Date: November 23, 2022 (last updated October 08, 2023)
An issue was discovered in libxml2 before 2.10.3. When parsing a multi-gigabyte XML document with the XML_PARSE_HUGE parser option enabled, several integer counters can overflow. This results in an attempt to access an array at a negative 2GB offset, typically leading to a segmentation fault.
Attacker Value
Unknown

CVE-2022-45061

Disclosure Date: November 09, 2022 (last updated November 08, 2023)
An issue was discovered in Python before 3.11.1. An unnecessary quadratic algorithm exists in one path when processing some inputs to the IDNA (RFC 3490) decoder, such that a crafted, unreasonably long name being presented to the decoder could lead to a CPU denial of service. Hostnames are often supplied by remote servers that could be controlled by a malicious actor; in such a scenario, they could trigger excessive CPU consumption on the client attempting to make use of an attacker-supplied supposed hostname. For example, the attack payload could be placed in the Location header of an HTTP response with status code 302. A fix is planned in 3.11.1, 3.10.9, 3.9.16, 3.8.16, and 3.7.16.
Attacker Value
Unknown

CVE-2020-35527

Disclosure Date: September 01, 2022 (last updated December 22, 2024)
In SQLite 3.31.1, there is an out of bounds access problem through ALTER TABLE for views that have a nested FROM clause.