Show filters
82 Total Results
Displaying 31-40 of 82
Sort by:
Attacker Value
Unknown

CVE-2023-46846

Disclosure Date: November 03, 2023 (last updated December 18, 2024)
SQUID is vulnerable to HTTP request smuggling, caused by chunked decoder lenience, allows a remote attacker to perform Request/Response smuggling past firewall and frontend security systems.
Attacker Value
Unknown

CVE-2023-3972

Disclosure Date: November 01, 2023 (last updated April 25, 2024)
A vulnerability was found in insights-client. This security issue occurs because of insecure file operations or unsafe handling of temporary files and directories that lead to local privilege escalation. Before the insights-client has been registered on the system by root, an unprivileged local user or attacker could create the /var/tmp/insights-client directory (owning the directory with read, write, and execute permissions) on the system. After the insights-client is registered by root, an attacker could then control the directory content that insights are using by putting malicious scripts into it and executing arbitrary code as root (trivially bypassing SELinux protections because insights processes are allowed to disable SELinux system-wide).
Attacker Value
Unknown

CVE-2023-5367

Disclosure Date: October 25, 2023 (last updated April 25, 2024)
A out-of-bounds write flaw was found in the xorg-x11-server. This issue occurs due to an incorrect calculation of a buffer offset when copying data stored in the heap in the XIChangeDeviceProperty function in Xi/xiproperty.c and in RRChangeOutputProperty function in randr/rrproperty.c, allowing for possible escalation of privileges or denial of service.
Attacker Value
Unknown

CVE-2023-5633

Disclosure Date: October 23, 2023 (last updated October 10, 2024)
The reference count changes made as part of the CVE-2023-33951 and CVE-2023-33952 fixes exposed a use-after-free flaw in the way memory objects were handled when they were being used to store a surface. When running inside a VMware guest with 3D acceleration enabled, a local, unprivileged user could potentially use this flaw to escalate their privileges.
Attacker Value
Unknown

CVE-2023-4732

Disclosure Date: October 03, 2023 (last updated April 25, 2024)
A flaw was found in pfn_swap_entry_to_page in memory management subsystem in the Linux Kernel. In this flaw, an attacker with a local user privilege may cause a denial of service problem due to a BUG statement referencing pmd_t x.
Attacker Value
Unknown

CVE-2023-5157

Disclosure Date: September 27, 2023 (last updated June 19, 2024)
A vulnerability was found in MariaDB. An OpenVAS port scan on ports 3306 and 4567 allows a malicious remote client to cause a denial of service.
Attacker Value
Unknown

CVE-2022-4318

Disclosure Date: September 25, 2023 (last updated May 03, 2024)
A vulnerability was found in cri-o. This issue allows the addition of arbitrary lines into /etc/passwd by use of a specially crafted environment variable.
Attacker Value
Unknown

CVE-2023-4806

Disclosure Date: September 18, 2023 (last updated April 25, 2024)
A flaw was found in glibc. In an extremely rare situation, the getaddrinfo function may access memory that has been freed, resulting in an application crash. This issue is only exploitable when a NSS module implements only the _nss_*_gethostbyname2_r and _nss_*_getcanonname_r hooks without implementing the _nss_*_gethostbyname3_r hook. The resolved name should return a large number of IPv6 and IPv4, and the call to the getaddrinfo function should have the AF_INET6 address family with AI_CANONNAME, AI_ALL and AI_V4MAPPED as flags.
Attacker Value
Unknown

CVE-2023-4527

Disclosure Date: September 18, 2023 (last updated April 25, 2024)
A flaw was found in glibc. When the getaddrinfo function is called with the AF_UNSPEC address family and the system is configured with no-aaaa mode via /etc/resolv.conf, a DNS response via TCP larger than 2048 bytes can potentially disclose stack contents through the function returned address data, and may cause a crash.
Attacker Value
Unknown

CVE-2023-4813

Disclosure Date: September 12, 2023 (last updated April 25, 2024)
A flaw was found in glibc. In an uncommon situation, the gaih_inet function may use memory that has been freed, resulting in an application crash. This issue is only exploitable when the getaddrinfo function is called and the hosts database in /etc/nsswitch.conf is configured with SUCCESS=continue or SUCCESS=merge.