CVE-2021-3600
- EPSS 0.12%
- Veröffentlicht 08.01.2024 19:15:08
- Zuletzt bearbeitet 21.11.2024 06:21:56
It was discovered that the eBPF implementation in the Linux kernel did not properly track bounds information for 32 bit registers when performing div and mod operations. A local attacker could use this to possibly execute arbitrary code.
CVE-2024-0217
- EPSS 0.01%
- Veröffentlicht 03.01.2024 17:15:12
- Zuletzt bearbeitet 21.11.2024 08:46:05
A use-after-free flaw was found in PackageKitd. In some conditions, the order of cleanup mechanics for a transaction could be impacted. As a result, some memory access could occur on memory regions that were previously freed. Once freed, a memory reg...
CVE-2023-6004
- EPSS 0.05%
- Veröffentlicht 03.01.2024 17:15:11
- Zuletzt bearbeitet 04.11.2025 19:16:23
A flaw was found in libssh. By utilizing the ProxyCommand or ProxyJump feature, users can exploit unchecked hostname syntax on the client. This issue may allow an attacker to inject malicious code into the command of the features mentioned through th...
CVE-2023-7192
- EPSS 0.02%
- Veröffentlicht 02.01.2024 19:15:11
- Zuletzt bearbeitet 21.11.2024 08:45:28
A memory leak problem was found in ctnetlink_create_conntrack in net/netfilter/nf_conntrack_netlink.c in the Linux Kernel. This issue may allow a local attacker with CAP_NET_ADMIN privileges to cause a denial of service (DoS) attack due to a refcount...
CVE-2024-0193
- EPSS 0.06%
- Veröffentlicht 02.01.2024 18:15:08
- Zuletzt bearbeitet 21.11.2024 08:46:02
A use-after-free flaw was found in the netfilter subsystem of the Linux kernel. If the catchall element is garbage-collected when the pipapo set is removed, the element can be deactivated twice. This can cause a use-after-free issue on an NFT_CHAIN o...
CVE-2023-6693
- EPSS 0.03%
- Veröffentlicht 02.01.2024 10:15:08
- Zuletzt bearbeitet 03.11.2025 20:16:07
A stack based buffer overflow was found in the virtio-net device of QEMU. This issue occurs when flushing TX in the virtio_net_flush_tx function if guest features VIRTIO_NET_F_HASH_REPORT, VIRTIO_F_VERSION_1 and VIRTIO_NET_F_MRG_RXBUF are enabled. Th...
CVE-2023-4641
- EPSS 0.02%
- Veröffentlicht 27.12.2023 16:15:13
- Zuletzt bearbeitet 03.11.2025 20:16:05
A flaw was found in shadow-utils. When asking for a new password, shadow-utils asks the password twice. If the password fails on the second attempt, shadow-utils fails in cleaning the buffer used to store the first entry. This may allow an attacker w...
- EPSS 0.01%
- Veröffentlicht 24.12.2023 07:15:07
- Zuletzt bearbeitet 18.11.2025 22:15:43
OpenSSH through 10.0, when common types of DRAM are used, might allow row hammer attacks (for authentication bypass) because the integer value of authenticated in mm_answer_authpassword does not resist flips of a single bit. NOTE: this is applicable ...
CVE-2023-51765
- EPSS 0.84%
- Veröffentlicht 24.12.2023 06:15:07
- Zuletzt bearbeitet 21.11.2024 08:38:44
sendmail through 8.17.2 allows SMTP smuggling in certain configurations. Remote attackers can use a published exploitation technique to inject e-mail messages with a spoofed MAIL FROM address, allowing bypass of an SPF protection mechanism. This occu...
CVE-2023-51764
- EPSS 21.85%
- Veröffentlicht 24.12.2023 05:15:08
- Zuletzt bearbeitet 04.11.2025 22:15:56
Postfix through 3.8.5 allows SMTP smuggling unless configured with smtpd_data_restrictions=reject_unauth_pipelining and smtpd_discard_ehlo_keywords=chunking (or certain other options that exist in recent versions). Remote attackers can use a publishe...