Show filters
961 Total Results
Displaying 81-90 of 961
Sort by:
Attacker Value
Unknown
CVE-2022-48437
Disclosure Date: April 12, 2023 (last updated October 08, 2023)
An issue was discovered in x509/x509_verify.c in LibreSSL before 3.6.1, and in OpenBSD before 7.2 errata 001. x509_verify_ctx_add_chain does not store errors that occur during leaf certificate verification, and therefore an incorrect error is returned. This behavior occurs when there is an installed verification callback that instructs the verifier to continue upon detecting an invalid certificate.
0
Attacker Value
Unknown
CVE-2023-29323
Disclosure Date: April 04, 2023 (last updated October 08, 2023)
ascii_load_sockaddr in smtpd in OpenBSD before 7.1 errata 024 and 7.2 before errata 020, and OpenSMTPD Portable before 7.0.0-portable commit f748277, can abort upon a connection from a local, scoped IPv6 address.
0
Attacker Value
Unknown
CVE-2023-28531
Disclosure Date: March 17, 2023 (last updated October 08, 2023)
ssh-add in OpenSSH before 9.3 adds smartcard keys to ssh-agent without the intended per-hop destination constraints. The earliest affected version is 8.9.
0
Attacker Value
Unknown
CVE-2023-27567
Disclosure Date: March 03, 2023 (last updated October 08, 2023)
In OpenBSD 7.2, a TCP packet with destination port 0 that matches a pf divert-to rule can crash the kernel.
0
Attacker Value
Unknown
CVE-2023-0751
Disclosure Date: February 08, 2023 (last updated November 08, 2023)
When GELI reads a key file from standard input, it does not reuse the key file to initialize multiple providers at once resulting in the second and subsequent devices silently using a NULL key as the user key file. If a user only uses a key file without a user passphrase, the master key is encrypted with an empty key file allowing trivial recovery of the master key.
0
Attacker Value
Unknown
CVE-2023-25136
Disclosure Date: February 03, 2023 (last updated February 28, 2024)
OpenSSH server (sshd) 9.1 introduced a double-free vulnerability during options.kex_algorithms handling. This is fixed in OpenSSH 9.2. The double free can be leveraged, by an unauthenticated remote attacker in the default configuration, to jump to any location in the sshd address space. One third-party report states "remote code execution is theoretically possible."
0
Attacker Value
Unknown
CVE-2022-4743
Disclosure Date: January 12, 2023 (last updated October 08, 2023)
A potential memory leak issue was discovered in SDL2 in GLES_CreateTexture() function in SDL_render_gles.c. The vulnerability allows an attacker to cause a denial of service attack. The vulnerability affects SDL2 v2.0.4 and above. SDL-1.x are not affected.
0
Attacker Value
Unknown
CVE-2022-32264
Disclosure Date: September 06, 2022 (last updated February 24, 2025)
sys/netinet/tcp_timer.h in FreeBSD before 7.0 contains a denial-of-service (DoS) vulnerability due to improper handling of TSopt on TCP connections. NOTE: This vulnerability only affects products that are no longer supported by the maintainer
0
Attacker Value
Unknown
CVE-2022-34568
Disclosure Date: July 28, 2022 (last updated February 24, 2025)
SDL v1.2 was discovered to contain a use-after-free via the XFree function at /src/video/x11/SDL_x11yuv.c.
0
Attacker Value
Unknown
CVE-2022-27470
Disclosure Date: May 04, 2022 (last updated February 23, 2025)
SDL_ttf v2.0.18 and below was discovered to contain an arbitrary memory write via the function TTF_RenderText_Solid(). This vulnerability is triggered via a crafted TTF file.
0