Show filters
3,723 Total Results
Displaying 221-230 of 3,723
Sort by:
Attacker Value
Unknown
CVE-2023-38200
Disclosure Date: July 24, 2023 (last updated February 25, 2025)
A flaw was found in Keylime. Due to their blocking nature, the Keylime registrar is subject to a remote denial of service against its SSL connections. This flaw allows an attacker to exhaust all available connections.
0
Attacker Value
Unknown
CVE-2023-32265
Disclosure Date: July 20, 2023 (last updated October 08, 2023)
A potential security vulnerability has been identified in the Enterprise Server Common Web Administration (ESCWA) component used in Enterprise Server, Enterprise Test Server, Enterprise Developer, Visual COBOL, and COBOL Server.
An attacker would need to be authenticated into ESCWA to attempt to exploit this vulnerability. As described in the hardening guide in the product documentation, other mitigations including restricting network access to ESCWA and restricting users’ permissions in the Micro Focus Directory Server also reduce the exposure to this issue.
Given the right conditions this vulnerability could be exploited to expose a service account password. The account corresponding to the exposed credentials usually has limited privileges and, in many cases would only be useful for extracting details of other user accounts and similar information.
0
Attacker Value
Unknown
CVE-2023-2295
Disclosure Date: May 17, 2023 (last updated February 25, 2025)
A vulnerability was found in the libreswan library. This security issue occurs when an IKEv1 Aggressive Mode packet is received with only unacceptable crypto algorithms, and the response packet is not sent with a zero responder SPI. When a subsequent packet is received where the sender reuses the libreswan responder SPI as its own initiator SPI, the pluto daemon state machine crashes. No remote code execution is possible. This CVE exists because of a CVE-2023-30570 security regression for libreswan package in Red Hat Enterprise Linux 8.8 and Red Hat Enterprise Linux 9.2.
0
Attacker Value
Unknown
CVE-2023-2491
Disclosure Date: May 17, 2023 (last updated February 25, 2025)
A flaw was found in the Emacs text editor. Processing a specially crafted org-mode code with the "org-babel-execute:latex" function in ob-latex.el can result in arbitrary command execution. This CVE exists because of a CVE-2023-28617 security regression for the emacs package in Red Hat Enterprise Linux 8.8 and Red Hat Enterprise Linux 9.2.
0
Attacker Value
Unknown
CVE-2023-2203
Disclosure Date: May 17, 2023 (last updated February 25, 2025)
A flaw was found in the WebKitGTK package. An improper input validation issue may lead to a use-after-free vulnerability. This flaw allows attackers with network access to pass specially crafted web content files, causing a denial of service or arbitrary code execution. This CVE exists because of a CVE-2023-28205 security regression for the WebKitGTK package in Red Hat Enterprise Linux 8.8 and Red Hat Enterprise Linux 9.2.
0
Attacker Value
Unknown
CVE-2023-24955
Disclosure Date: May 09, 2023 (last updated February 24, 2025)
Microsoft SharePoint Server Remote Code Execution Vulnerability
0
Attacker Value
Unknown
CVE-2023-24954
Disclosure Date: May 09, 2023 (last updated February 24, 2025)
Microsoft SharePoint Server Information Disclosure Vulnerability
0
Attacker Value
Unknown
CVE-2023-24950
Disclosure Date: May 09, 2023 (last updated February 24, 2025)
Microsoft SharePoint Server Spoofing Vulnerability
0
Attacker Value
Unknown
CVE-2023-1894
Disclosure Date: May 04, 2023 (last updated February 24, 2025)
A Regular Expression Denial of Service (ReDoS) issue was discovered in Puppet Server 7.9.2 certificate validation. An issue related to specifically crafted certificate names significantly slowed down server operations.
0
Attacker Value
Unknown
CVE-2023-29552
Disclosure Date: April 25, 2023 (last updated October 08, 2023)
The Service Location Protocol (SLP, RFC 2608) allows an unauthenticated, remote attacker to register arbitrary services. This could allow the attacker to use spoofed UDP traffic to conduct a denial-of-service attack with a significant amplification factor.
0