CVE-2024-12086
- EPSS 0.91%
- Veröffentlicht 14.01.2025 18:15:25
- Zuletzt bearbeitet 14.04.2026 22:16:26
A flaw was found in rsync. It could allow a server to enumerate the contents of an arbitrary file from the client's machine. This issue occurs when files are being copied from a client to a server. During this process, the rsync server will send chec...
CVE-2024-12087
- EPSS 3.19%
- Veröffentlicht 14.01.2025 18:15:25
- Zuletzt bearbeitet 14.04.2026 22:16:26
A path traversal vulnerability exists in rsync. It stems from behavior enabled by the `--inc-recursive` option, a default-enabled option for many client options and can be enabled by the server even if not explicitly enabled by the client. When using...
CVE-2024-12088
- EPSS 2.89%
- Veröffentlicht 14.01.2025 18:15:25
- Zuletzt bearbeitet 14.04.2026 22:16:27
A flaw was found in rsync. When using the `--safe-links` option, the rsync client fails to properly verify if a symbolic link destination sent from the server contains another symbolic link within it. This results in a path traversal vulnerability, w...
CVE-2024-49394
- EPSS 0.08%
- Veröffentlicht 12.11.2024 03:15:03
- Zuletzt bearbeitet 14.11.2024 13:38:04
In mutt and neomutt the In-Reply-To email header field is not protected by cryptographic signing which allows an attacker to reuse an unencrypted but signed email message to impersonate the original sender.
CVE-2024-49395
- EPSS 0.15%
- Veröffentlicht 12.11.2024 03:15:03
- Zuletzt bearbeitet 14.11.2024 13:33:35
In mutt and neomutt, PGP encryption does not use the --hidden-recipient mode which may leak the Bcc email header field by inferring from the recipients info.
CVE-2024-49393
- EPSS 0.08%
- Veröffentlicht 12.11.2024 02:15:18
- Zuletzt bearbeitet 16.07.2025 12:15:22
In neomutt and mutt, the To and Cc email headers are not validated by cryptographic signing which allows an attacker that intercepts a message to change their value and include himself as a one of the recipients to compromise message confidentiality.
CVE-2024-50074
- EPSS 0.02%
- Veröffentlicht 29.10.2024 01:15:04
- Zuletzt bearbeitet 03.11.2025 23:16:47
In the Linux kernel, the following vulnerability has been resolved: parport: Proper fix for array out-of-bounds access The recent fix for array out-of-bounds accesses replaced sprintf() calls blindly with snprintf(). However, since snprintf() retu...
CVE-2024-9676
- EPSS 1.28%
- Veröffentlicht 15.10.2024 16:15:06
- Zuletzt bearbeitet 19.03.2026 18:16:13
A vulnerability was found in Podman, Buildah, and CRI-O. A symlink traversal vulnerability in the containers/storage library can cause Podman, Buildah, and CRI-O to hang and result in a denial of service via OOM kill when running a malicious image us...
CVE-2024-9675
- EPSS 0.14%
- Veröffentlicht 09.10.2024 15:15:17
- Zuletzt bearbeitet 25.08.2025 02:11:05
A vulnerability was found in Buildah. Cache mounts do not properly validate that user-specified paths for the cache are within our cache directory, allowing a `RUN` instruction in a Container file to mount an arbitrary directory from the host (read/w...
CVE-2024-9341
- EPSS 0.9%
- Veröffentlicht 01.10.2024 19:15:09
- Zuletzt bearbeitet 11.12.2024 04:15:06
A flaw was found in Go. When FIPS mode is enabled on a system, container runtimes may incorrectly handle certain file paths due to improper validation in the containers/common Go library. This flaw allows an attacker to exploit symbolic links and tri...