Show filters
827 Total Results
Displaying 41-50 of 827
Sort by:
Attacker Value
Unknown
CVE-2023-51766
Disclosure Date: December 24, 2023 (last updated February 02, 2024)
Exim before 4.97.1 allows SMTP smuggling in certain PIPELINING/CHUNKING configurations. Remote attackers can use a published exploitation technique to inject e-mail messages with a spoofed MAIL FROM address, allowing bypass of an SPF protection mechanism. This occurs because Exim supports <LF>.<CR><LF> but some other popular e-mail servers do not.
0
Attacker Value
Unknown
CVE-2023-6478
Disclosure Date: December 13, 2023 (last updated April 25, 2024)
A flaw was found in xorg-server. A specially crafted request to RRChangeProviderProperty or RRChangeOutputProperty can trigger an integer overflow which may lead to a disclosure of sensitive information.
0
Attacker Value
Unknown
CVE-2023-6377
Disclosure Date: December 13, 2023 (last updated April 25, 2024)
A flaw was found in xorg-server. Querying or changing XKB button actions such as moving from a touchpad to a mouse can result in out-of-bounds memory reads and writes. This may allow local privilege escalation or possible remote code execution in cases where X11 forwarding is involved.
0
Attacker Value
Unknown
CVE-2023-42755
Disclosure Date: October 05, 2023 (last updated May 22, 2024)
A flaw was found in the IPv4 Resource Reservation Protocol (RSVP) classifier in the Linux kernel. The xprt pointer may go beyond the linear part of the skb, leading to an out-of-bounds read in the `rsvp_classify` function. This issue may allow a local user to crash the system and cause a denial of service.
0
Attacker Value
Unknown
CVE-2023-44488
Disclosure Date: September 30, 2023 (last updated November 16, 2023)
VP9 in libvpx before 1.13.1 mishandles widths, leading to a crash related to encoding.
0
Attacker Value
Unknown
CVE-2023-5217
Disclosure Date: September 28, 2023 (last updated December 21, 2024)
Heap buffer overflow in vp8 encoding in libvpx in Google Chrome prior to 117.0.5938.132 and libvpx 1.13.1 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
0
Attacker Value
Unknown
CVE-2023-42756
Disclosure Date: September 28, 2023 (last updated April 30, 2024)
A flaw was found in the Netfilter subsystem of the Linux kernel. A race condition between IPSET_CMD_ADD and IPSET_CMD_SWAP can lead to a kernel panic due to the invocation of `__ip_set_put` on a wrong `set`. This issue may allow a local user to crash the system.
0
Attacker Value
Unknown
CVE-2023-42753
Disclosure Date: September 25, 2023 (last updated August 27, 2024)
An array indexing vulnerability was found in the netfilter subsystem of the Linux kernel. A missing macro could lead to a miscalculation of the `h->nets` array offset, providing attackers with the primitive to arbitrarily increment/decrement a memory buffer out-of-bound. This issue may allow a local user to crash the system or potentially escalate their privileges on the system.
0
Attacker Value
Unknown
CVE-2022-40982
Disclosure Date: August 11, 2023 (last updated October 08, 2023)
Information exposure through microarchitectural state after transient execution in certain vector execution units for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
0
Attacker Value
Unknown
CVE-2023-4194
Disclosure Date: August 07, 2023 (last updated April 25, 2024)
A flaw was found in the Linux kernel's TUN/TAP functionality. This issue could allow a local user to bypass network filters and gain unauthorized access to some resources. The original patches fixing CVE-2023-1076 are incorrect or incomplete. The problem is that the following upstream commits - a096ccca6e50 ("tun: tun_chr_open(): correctly initialize socket uid"), - 66b2c338adce ("tap: tap_open(): correctly initialize socket uid"), pass "inode->i_uid" to sock_init_data_uid() as the last parameter and that turns out to not be accurate.
0