Show filters
105 Total Results
Displaying 71-80 of 105
Sort by:
Attacker Value
Unknown

CVE-2023-4727

Disclosure Date: June 11, 2024 (last updated November 21, 2024)
A flaw was found in dogtag-pki and pki-core. The token authentication scheme can be bypassed with a LDAP injection. By passing the query string parameter sessionID=*, an attacker can authenticate with an existing session saved in the LDAP directory server, which may lead to escalation of privilege.
0
Attacker Value
Unknown

CVE-2024-5564

Disclosure Date: May 31, 2024 (last updated July 19, 2024)
A vulnerability was found in libndp. This flaw allows a local malicious user to cause a buffer overflow in NetworkManager, triggered by sending a malformed IPv6 router advertisement packet. This issue occurred as libndp was not correctly validating the route length information.
0
Attacker Value
Unknown

CVE-2024-3657

Disclosure Date: May 28, 2024 (last updated February 18, 2025)
A flaw was found in 389-ds-base. A specially-crafted LDAP query can potentially cause a failure on the directory server, leading to a denial of service
0
Attacker Value
Unknown

CVE-2024-2199

Disclosure Date: May 28, 2024 (last updated February 18, 2025)
A denial of service vulnerability was found in 389-ds-base ldap server. This issue may allow an authenticated user to cause a server crash while modifying `userPassword` using malformed input.
0
Attacker Value
Unknown

CVE-2024-4693

Disclosure Date: May 14, 2024 (last updated May 15, 2024)
A flaw was found in the QEMU Virtio PCI Bindings (hw/virtio/virtio-pci.c). An improper release and use of the irqfd for vector 0 during the boot process leads to a guest triggerable crash via vhost_net_stop(). This flaw allows a malicious guest to crash the QEMU process on the host.
0
Attacker Value
Unknown

CVE-2024-3727

Disclosure Date: May 14, 2024 (last updated January 20, 2025)
A flaw was found in the github.com/containers/image library. This flaw allows attackers to trigger unexpected authenticated registry accesses on behalf of a victim user, causing resource exhaustion, local path traversal, and other attacks.
0
Attacker Value
Unknown

CVE-2024-4418

Disclosure Date: May 08, 2024 (last updated July 23, 2024)
A race condition leading to a stack use-after-free flaw was found in libvirt. Due to a bad assumption in the virNetClientIOEventLoop() method, the `data` pointer to a stack-allocated virNetClientIOEventData structure ended up being used in the virNetClientIOEventFD callback while the data pointer's stack frame was concurrently being "freed" when returning from virNetClientIOEventLoop(). The 'virtproxyd' daemon can be used to trigger requests. If libvirt is configured with fine-grained access control, this issue, in theory, allows a user to escape their otherwise limited access. This flaw allows a local, unprivileged user to access virtproxyd without authenticating. Remote users would need to authenticate before they could access it.
0
Attacker Value
Unknown

CVE-2024-2905

Disclosure Date: April 25, 2024 (last updated June 12, 2024)
A security vulnerability has been discovered within rpm-ostree, pertaining to the /etc/shadow file in default builds having the world-readable bit enabled. This issue arises from the default permissions being set at a higher level than recommended, potentially exposing sensitive authentication data to unauthorized access.
0
Attacker Value
Unknown

CVE-2024-2467

Disclosure Date: April 25, 2024 (last updated April 26, 2024)
A timing-based side-channel flaw exists in the perl-Crypt-OpenSSL-RSA package, which could be sufficient to recover plaintext across a network in a Bleichenbacher-style attack. To achieve successful decryption, an attacker would have to be able to send a large number of trial messages. The vulnerability affects the legacy PKCS#1v1.5 RSA encryption padding mode.
0
Attacker Value
Unknown

CVE-2023-3758

Disclosure Date: April 18, 2024 (last updated May 22, 2024)
A race condition flaw was found in sssd where the GPO policy is not consistently applied for authenticated users. This may lead to improper authorization issues, granting or denying access to resources inappropriately.
0