Show filters
827 Total Results
Displaying 61-70 of 827
Sort by:
Attacker Value
Unknown

CVE-2023-34151

Disclosure Date: May 30, 2023 (last updated December 21, 2024)
A vulnerability was found in ImageMagick. This security flaw ouccers as an undefined behaviors of casting double to size_t in svg, mvg and other coders (recurring bugs of CVE-2022-32546).
Attacker Value
Unknown

CVE-2023-1667

Disclosure Date: May 26, 2023 (last updated October 08, 2023)
A NULL pointer dereference was found In libssh during re-keying with algorithm guessing. This issue may allow an authenticated client to cause a denial of service.
Attacker Value
Unknown

CVE-2023-2156

Disclosure Date: May 09, 2023 (last updated February 03, 2024)
A flaw was found in the networking subsystem of the Linux kernel within the handling of the RPL protocol. This issue results from the lack of proper handling of user-supplied data, which can lead to an assertion failure. This may allow an unauthenticated remote attacker to create a denial of service condition on the system.
Attacker Value
Unknown

CVE-2023-1380

Disclosure Date: March 27, 2023 (last updated December 09, 2023)
A slab-out-of-bound read problem was found in brcmf_get_assoc_ies in drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c in the Linux Kernel. This issue could occur when assoc_info->req_len data is bigger than the size of the buffer, defined as WL_EXTRA_BUF_MAX, leading to a denial of service.
Attacker Value
Unknown

CVE-2023-27561

Disclosure Date: March 03, 2023 (last updated October 08, 2023)
runc through 1.1.4 has Incorrect Access Control leading to Escalation of Privileges, related to libcontainer/rootfs_linux.go. To exploit this, an attacker must be able to spawn two containers with custom volume-mount configurations, and be able to run custom images. NOTE: this issue exists because of a CVE-2019-19921 regression.
Attacker Value
Unknown

CVE-2023-0361

Disclosure Date: February 15, 2023 (last updated October 08, 2023)
A timing side-channel in the handling of RSA ClientKeyExchange messages was discovered in GnuTLS. This side-channel can be sufficient to recover the key encrypted in the RSA ciphertext across a network in a Bleichenbacher style attack. To achieve a successful decryption the attacker would need to send a large amount of specially crafted messages to the vulnerable server. By recovering the secret from the ClientKeyExchange message, the attacker would be able to decrypt the application data exchanged over that connection.
Attacker Value
Unknown

CVE-2022-2850

Disclosure Date: October 14, 2022 (last updated October 08, 2023)
A flaw was found In 389-ds-base. When the Content Synchronization plugin is enabled, an authenticated user can reach a NULL pointer dereference using a specially crafted query. This flaw allows an authenticated attacker to cause a denial of service. This CVE is assigned against an incomplete fix of CVE-2021-3514.
Attacker Value
Unknown

CVE-2022-2905

Disclosure Date: September 09, 2022 (last updated November 08, 2023)
An out-of-bounds memory read flaw was found in the Linux kernel's BPF subsystem in how a user calls the bpf_tail_call function with a key larger than the max_entries of the map. This flaw allows a local user to gain unauthorized access to data.
Attacker Value
Unknown

CVE-2022-2132

Disclosure Date: August 31, 2022 (last updated October 08, 2023)
A permissive list of allowed inputs flaw was found in DPDK. This issue allows a remote attacker to cause a denial of service triggered by sending a crafted Vhost header to DPDK.
Attacker Value
Unknown

CVE-2022-1354

Disclosure Date: August 31, 2022 (last updated November 29, 2024)
A heap buffer overflow flaw was found in Libtiffs' tiffinfo.c in TIFFReadRawDataStriped() function. This flaw allows an attacker to pass a crafted TIFF file to the tiffinfo tool, triggering a heap buffer overflow issue and causing a crash that leads to a denial of service.