CVE-2023-40660
- EPSS 0.04%
- Veröffentlicht 06.11.2023 17:15:11
- Zuletzt bearbeitet 03.11.2025 22:16:26
A flaw was found in OpenSC packages that allow a potential PIN bypass. When a token/card is authenticated by one process, it can perform cryptographic operations in other processes when an empty zero-length pin is passed. This issue poses a security ...
CVE-2023-40661
- EPSS 0.32%
- Veröffentlicht 06.11.2023 17:15:11
- Zuletzt bearbeitet 03.11.2025 22:16:26
Several memory vulnerabilities were identified within the OpenSC packages, particularly in the card enrollment process using pkcs15-init when a user or administrator enrolls cards. To take advantage of these flaws, an attacker must have physical acce...
CVE-2023-5090
- EPSS 0.02%
- Veröffentlicht 06.11.2023 11:15:09
- Zuletzt bearbeitet 21.11.2024 08:41:02
A flaw was found in KVM. An improper check in svm_set_x2apic_msr_interception() may allow direct access to host x2apic msrs when the guest resets its apic, potentially leading to a denial of service condition.
CVE-2023-42669
- EPSS 0.58%
- Veröffentlicht 06.11.2023 07:15:09
- Zuletzt bearbeitet 21.11.2024 08:22:55
A vulnerability was found in Samba's "rpcecho" development server, a non-Windows RPC server used to test Samba's DCE/RPC stack elements. This vulnerability stems from an RPC function that can be blocked indefinitely. The issue arises because the "rpc...
- EPSS 0.01%
- Veröffentlicht 03.11.2023 14:15:08
- Zuletzt bearbeitet 03.11.2025 20:16:06
A bug in QEMU could cause a guest I/O operation otherwise addressed to an arbitrary disk offset to be targeted to offset 0 instead (potentially overwriting the VM's boot code). This could be used, for example, by L2 guests with a virtual disk (vdiskL...
CVE-2023-3961
- EPSS 1.94%
- Veröffentlicht 03.11.2023 13:15:08
- Zuletzt bearbeitet 21.11.2024 08:18:24
A path traversal vulnerability was identified in Samba when processing client pipe names connecting to Unix domain sockets within a private directory. Samba typically uses this mechanism to connect SMB clients to remote procedure call (RPC) services ...
- EPSS 0.02%
- Veröffentlicht 03.11.2023 09:15:13
- Zuletzt bearbeitet 21.11.2024 07:39:16
A use-after-free flaw was found in the Linux kernel’s mm/mremap memory address space accounting source code. This issue occurs due to a race condition between rmap walk and mremap, allowing a local user to crash the system or potentially escalate the...
CVE-2023-46847
- EPSS 44.74%
- Veröffentlicht 03.11.2023 08:15:08
- Zuletzt bearbeitet 21.11.2024 08:29:25
Squid is vulnerable to a Denial of Service, where a remote attacker can perform buffer overflow attack by writing up to 2 MB of arbitrary data to heap memory when Squid is configured to accept HTTP Digest Authentication.
CVE-2023-46848
- EPSS 8.23%
- Veröffentlicht 03.11.2023 08:15:08
- Zuletzt bearbeitet 21.11.2024 08:29:25
Squid is vulnerable to Denial of Service, where a remote attacker can perform DoS by sending ftp:// URLs in HTTP Request messages or constructing ftp:// URLs from FTP Native input.
CVE-2023-4091
- EPSS 0.48%
- Veröffentlicht 03.11.2023 08:15:08
- Zuletzt bearbeitet 21.11.2024 08:34:22
A vulnerability was discovered in Samba, where the flaw allows SMB clients to truncate files, even with read-only permissions when the Samba VFS module "acl_xattr" is configured with "acl_xattr:ignore system acls = yes". The SMB protocol allows openi...