Show filters
961 Total Results
Displaying 81-90 of 961
Sort by:
Attacker Value
Unknown

CVE-2022-48437

Disclosure Date: April 12, 2023 (last updated October 08, 2023)
An issue was discovered in x509/x509_verify.c in LibreSSL before 3.6.1, and in OpenBSD before 7.2 errata 001. x509_verify_ctx_add_chain does not store errors that occur during leaf certificate verification, and therefore an incorrect error is returned. This behavior occurs when there is an installed verification callback that instructs the verifier to continue upon detecting an invalid certificate.
Attacker Value
Unknown

CVE-2023-29323

Disclosure Date: April 04, 2023 (last updated October 08, 2023)
ascii_load_sockaddr in smtpd in OpenBSD before 7.1 errata 024 and 7.2 before errata 020, and OpenSMTPD Portable before 7.0.0-portable commit f748277, can abort upon a connection from a local, scoped IPv6 address.
Attacker Value
Unknown

CVE-2023-28531

Disclosure Date: March 17, 2023 (last updated October 08, 2023)
ssh-add in OpenSSH before 9.3 adds smartcard keys to ssh-agent without the intended per-hop destination constraints. The earliest affected version is 8.9.
Attacker Value
Unknown

CVE-2023-27567

Disclosure Date: March 03, 2023 (last updated October 08, 2023)
In OpenBSD 7.2, a TCP packet with destination port 0 that matches a pf divert-to rule can crash the kernel.
Attacker Value
Unknown

CVE-2023-0751

Disclosure Date: February 08, 2023 (last updated November 08, 2023)
When GELI reads a key file from standard input, it does not reuse the key file to initialize multiple providers at once resulting in the second and subsequent devices silently using a NULL key as the user key file. If a user only uses a key file without a user passphrase, the master key is encrypted with an empty key file allowing trivial recovery of the master key.
Attacker Value
Unknown

CVE-2023-25136

Disclosure Date: February 03, 2023 (last updated February 28, 2024)
OpenSSH server (sshd) 9.1 introduced a double-free vulnerability during options.kex_algorithms handling. This is fixed in OpenSSH 9.2. The double free can be leveraged, by an unauthenticated remote attacker in the default configuration, to jump to any location in the sshd address space. One third-party report states "remote code execution is theoretically possible."
Attacker Value
Unknown

CVE-2022-4743

Disclosure Date: January 12, 2023 (last updated October 08, 2023)
A potential memory leak issue was discovered in SDL2 in GLES_CreateTexture() function in SDL_render_gles.c. The vulnerability allows an attacker to cause a denial of service attack. The vulnerability affects SDL2 v2.0.4 and above. SDL-1.x are not affected.
Attacker Value
Unknown

CVE-2022-32264

Disclosure Date: September 06, 2022 (last updated February 24, 2025)
sys/netinet/tcp_timer.h in FreeBSD before 7.0 contains a denial-of-service (DoS) vulnerability due to improper handling of TSopt on TCP connections. NOTE: This vulnerability only affects products that are no longer supported by the maintainer
Attacker Value
Unknown

CVE-2022-34568

Disclosure Date: July 28, 2022 (last updated February 24, 2025)
SDL v1.2 was discovered to contain a use-after-free via the XFree function at /src/video/x11/SDL_x11yuv.c.
Attacker Value
Unknown

CVE-2022-27470

Disclosure Date: May 04, 2022 (last updated February 23, 2025)
SDL_ttf v2.0.18 and below was discovered to contain an arbitrary memory write via the function TTF_RenderText_Solid(). This vulnerability is triggered via a crafted TTF file.