Show filters
3,616 Total Results
Displaying 281-290 of 3,616
Sort by:
Attacker Value
Unknown

CVE-2023-40167

Disclosure Date: September 15, 2023 (last updated February 25, 2025)
Jetty is a Java based web server and servlet engine. Prior to versions 9.4.52, 10.0.16, 11.0.16, and 12.0.1, Jetty accepts the `+` character proceeding the content-length value in a HTTP/1 header field. This is more permissive than allowed by the RFC and other servers routinely reject such requests with 400 responses. There is no known exploit scenario, but it is conceivable that request smuggling could result if jetty is used in combination with a server that does not close the connection after sending such a 400 response. Versions 9.4.52, 10.0.16, 11.0.16, and 12.0.1 contain a patch for this issue. There is no workaround as there is no known exploit scenario.
Attacker Value
Unknown

CVE-2023-36479

Disclosure Date: September 15, 2023 (last updated February 25, 2025)
Eclipse Jetty Canonical Repository is the canonical repository for the Jetty project. Users of the CgiServlet with a very specific command structure may have the wrong command executed. If a user sends a request to a org.eclipse.jetty.servlets.CGI Servlet for a binary with a space in its name, the servlet will escape the command by wrapping it in quotation marks. This wrapped command, plus an optional command prefix, will then be executed through a call to Runtime.exec. If the original binary name provided by the user contains a quotation mark followed by a space, the resulting command line will contain multiple tokens instead of one. This issue was patched in version 9.4.52, 10.0.16, 11.0.16 and 12.0.0-beta2.
Attacker Value
Unknown

CVE-2023-4921

Disclosure Date: September 12, 2023 (last updated February 25, 2025)
A use-after-free vulnerability in the Linux kernel's net/sched: sch_qfq component can be exploited to achieve local privilege escalation. When the plug qdisc is used as a class of the qfq qdisc, sending network packets triggers use-after-free in qfq_dequeue() due to the incorrect .peek handler of sch_plug and lack of error checking in agg_dequeue(). We recommend upgrading past commit 8fc134fee27f2263988ae38920bc03da416b03d8.
Attacker Value
Unknown

CVE-2023-41915

Disclosure Date: September 09, 2023 (last updated February 25, 2025)
OpenPMIx PMIx before 4.2.6 and 5.0.x before 5.0.1 allows attackers to obtain ownership of arbitrary files via a race condition during execution of library code with UID 0.
Attacker Value
Unknown

CVE-2023-4875

Disclosure Date: September 09, 2023 (last updated February 25, 2025)
Null pointer dereference when composing from a specially crafted draft message in Mutt >1.5.2 <2.2.12
Attacker Value
Unknown

CVE-2023-4874

Disclosure Date: September 09, 2023 (last updated February 25, 2025)
Null pointer dereference when viewing a specially crafted email in Mutt >1.5.2 <2.2.12
Attacker Value
Unknown

CVE-2023-4623

Disclosure Date: September 06, 2023 (last updated February 25, 2025)
A use-after-free vulnerability in the Linux kernel's net/sched: sch_hfsc (HFSC qdisc traffic control) component can be exploited to achieve local privilege escalation. If a class with a link-sharing curve (i.e. with the HFSC_FSC flag set) has a parent without a link-sharing curve, then init_vf() will call vttree_insert() on the parent, but vttree_remove() will be skipped in update_vf(). This leaves a dangling pointer that can cause a use-after-free. We recommend upgrading past commit b3d26c5702c7d6c45456326e56d2ccf3f103e60f.
Attacker Value
Unknown

CVE-2023-4622

Disclosure Date: September 06, 2023 (last updated February 25, 2025)
A use-after-free vulnerability in the Linux kernel's af_unix component can be exploited to achieve local privilege escalation. The unix_stream_sendpage() function tries to add data to the last skb in the peer's recv queue without locking the queue. Thus there is a race where unix_stream_sendpage() could access an skb locklessly that is being released by garbage collection, resulting in use-after-free. We recommend upgrading past commit 790c2f9d15b594350ae9bca7b236f2b1859de02c.
Attacker Value
Unknown

CVE-2023-4244

Disclosure Date: September 06, 2023 (last updated February 25, 2025)
A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation. Due to a race condition between nf_tables netlink control plane transaction and nft_set element garbage collection, it is possible to underflow the reference counter causing a use-after-free vulnerability. We recommend upgrading past commit 3e91b0ebd994635df2346353322ac51ce84ce6d8.
Attacker Value
Unknown

CVE-2023-4781

Disclosure Date: September 05, 2023 (last updated February 25, 2025)
Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.1873.