CVE-2024-0193
- EPSS 0.11%
- Veröffentlicht 02.01.2024 18:15:08
- Zuletzt bearbeitet 21.11.2024 08:46:02
A use-after-free flaw was found in the netfilter subsystem of the Linux kernel. If the catchall element is garbage-collected when the pipapo set is removed, the element can be deactivated twice. This can cause a use-after-free issue on an NFT_CHAIN o...
CVE-2023-6693
- EPSS 0.03%
- Veröffentlicht 02.01.2024 10:15:08
- Zuletzt bearbeitet 03.11.2025 20:16:07
A stack based buffer overflow was found in the virtio-net device of QEMU. This issue occurs when flushing TX in the virtio_net_flush_tx function if guest features VIRTIO_NET_F_HASH_REPORT, VIRTIO_F_VERSION_1 and VIRTIO_NET_F_MRG_RXBUF are enabled. Th...
CVE-2023-4641
- EPSS 0.02%
- Veröffentlicht 27.12.2023 16:15:13
- Zuletzt bearbeitet 03.11.2025 20:16:05
A flaw was found in shadow-utils. When asking for a new password, shadow-utils asks the password twice. If the password fails on the second attempt, shadow-utils fails in cleaning the buffer used to store the first entry. This may allow an attacker w...
- EPSS 0.01%
- Veröffentlicht 24.12.2023 07:15:07
- Zuletzt bearbeitet 18.11.2025 22:15:43
OpenSSH through 10.0, when common types of DRAM are used, might allow row hammer attacks (for authentication bypass) because the integer value of authenticated in mm_answer_authpassword does not resist flips of a single bit. NOTE: this is applicable ...
CVE-2023-51765
- EPSS 0.84%
- Veröffentlicht 24.12.2023 06:15:07
- Zuletzt bearbeitet 21.11.2024 08:38:44
sendmail through 8.17.2 allows SMTP smuggling in certain configurations. Remote attackers can use a published exploitation technique to inject e-mail messages with a spoofed MAIL FROM address, allowing bypass of an SPF protection mechanism. This occu...
CVE-2023-51764
- EPSS 27.06%
- Veröffentlicht 24.12.2023 05:15:08
- Zuletzt bearbeitet 04.11.2025 22:15:56
Postfix through 3.8.5 allows SMTP smuggling unless configured with smtpd_data_restrictions=reject_unauth_pipelining and smtpd_discard_ehlo_keywords=chunking (or certain other options that exist in recent versions). Remote attackers can use a publishe...
- EPSS 0.33%
- Veröffentlicht 21.12.2023 20:15:08
- Zuletzt bearbeitet 18.02.2026 18:24:18
A race condition was found in the GSM 0710 tty multiplexor in the Linux kernel. This issue occurs when two threads execute the GSMIOC_SETCONF ioctl on the same tty file descriptor with the gsm line discipline enabled, and can lead to a use-after-free...
CVE-2023-6918
- EPSS 0.36%
- Veröffentlicht 19.12.2023 00:15:08
- Zuletzt bearbeitet 15.02.2025 01:15:09
A flaw was found in the libssh implements abstract layer for message digest (MD) operations implemented by different supported crypto backends. The return values from these were not properly checked, which could cause low-memory situations failures, ...
CVE-2023-48795
- EPSS 62.63%
- Veröffentlicht 18.12.2023 16:15:10
- Zuletzt bearbeitet 04.11.2025 22:15:55
The SSH transport protocol with certain OpenSSH extensions, found in OpenSSH before 9.6 and other products, allows remote attackers to bypass integrity checks such that some packets are omitted (from the extension negotiation message), and a client a...
CVE-2023-47038
- EPSS 0.11%
- Veröffentlicht 18.12.2023 14:15:08
- Zuletzt bearbeitet 04.11.2025 19:16:05
A vulnerability was found in perl 5.30.0 through 5.38.0. This issue occurs when a crafted regular expression is compiled by perl, which can allow an attacker controlled byte buffer overflow in a heap allocated buffer.