Show filters
3,723 Total Results
Displaying 201-210 of 3,723
Sort by:
Attacker Value
Unknown

CVE-2023-46848

Disclosure Date: November 03, 2023 (last updated February 25, 2025)
Squid is vulnerable to Denial of Service, where a remote attacker can perform DoS by sending ftp:// URLs in HTTP Request messages or constructing ftp:// URLs from FTP Native input.
Attacker Value
Unknown

CVE-2023-46847

Disclosure Date: November 03, 2023 (last updated February 25, 2025)
Squid is vulnerable to a Denial of Service, where a remote attacker can perform buffer overflow attack by writing up to 2 MB of arbitrary data to heap memory when Squid is configured to accept HTTP Digest Authentication.
Attacker Value
Unknown

CVE-2023-46846

Disclosure Date: November 03, 2023 (last updated February 25, 2025)
SQUID is vulnerable to HTTP request smuggling, caused by chunked decoder lenience, allows a remote attacker to perform Request/Response smuggling past firewall and frontend security systems.
Attacker Value
Unknown

CVE-2023-3972

Disclosure Date: November 01, 2023 (last updated February 25, 2025)
A vulnerability was found in insights-client. This security issue occurs because of insecure file operations or unsafe handling of temporary files and directories that lead to local privilege escalation. Before the insights-client has been registered on the system by root, an unprivileged local user or attacker could create the /var/tmp/insights-client directory (owning the directory with read, write, and execute permissions) on the system. After the insights-client is registered by root, an attacker could then control the directory content that insights are using by putting malicious scripts into it and executing arbitrary code as root (trivially bypassing SELinux protections because insights processes are allowed to disable SELinux system-wide).
Attacker Value
Unknown

CVE-2023-5574

Disclosure Date: October 25, 2023 (last updated February 25, 2025)
A use-after-free flaw was found in xorg-x11-server-Xvfb. This issue occurs in Xvfb with a very specific and legacy configuration (a multi-screen setup with multiple protocol screens, also known as Zaphod mode). If the pointer is warped from a screen 1 to a screen 0, a use-after-free issue may be triggered during shutdown or reset of the Xvfb server, allowing for possible escalation of privileges or denial of service.
Attacker Value
Unknown

CVE-2023-5380

Disclosure Date: October 25, 2023 (last updated February 25, 2025)
A use-after-free flaw was found in the xorg-x11-server. An X server crash may occur in a very specific and legacy configuration (a multi-screen setup with multiple protocol screens, also known as Zaphod mode) if the pointer is warped from within a window on one screen to the root window of the other screen and if the original window is destroyed followed by another window being destroyed.
Attacker Value
Unknown

CVE-2023-5367

Disclosure Date: October 25, 2023 (last updated February 25, 2025)
A out-of-bounds write flaw was found in the xorg-x11-server. This issue occurs due to an incorrect calculation of a buffer offset when copying data stored in the heap in the XIChangeDeviceProperty function in Xi/xiproperty.c and in RRChangeOutputProperty function in randr/rrproperty.c, allowing for possible escalation of privileges or denial of service.
Attacker Value
Unknown

CVE-2023-5633

Disclosure Date: October 23, 2023 (last updated February 25, 2025)
The reference count changes made as part of the CVE-2023-33951 and CVE-2023-33952 fixes exposed a use-after-free flaw in the way memory objects were handled when they were being used to store a surface. When running inside a VMware guest with 3D acceleration enabled, a local, unprivileged user could potentially use this flaw to escalate their privileges.
Attacker Value
Unknown

CVE-2023-5157

Disclosure Date: September 27, 2023 (last updated February 25, 2025)
A vulnerability was found in MariaDB. An OpenVAS port scan on ports 3306 and 4567 allows a malicious remote client to cause a denial of service.
Attacker Value
Unknown

CVE-2023-23766

Disclosure Date: September 22, 2023 (last updated February 25, 2025)
An incorrect comparison vulnerability was identified in GitHub Enterprise Server that allowed commit smuggling by displaying an incorrect diff in a re-opened Pull Request. To do so, an attacker would need write access to the repository. This vulnerability affected all versions of GitHub Enterprise Server and was fixed in versions 3.6.17, 3.7.15, 3.8.8, 3.9.3, and 3.10.1. This vulnerability was reported via the GitHub Bug Bounty program.