CVE-2024-6119
- EPSS 4.4%
- Veröffentlicht 03.09.2024 16:15:07
- Zuletzt bearbeitet 03.06.2025 10:51:54
Issue summary: Applications performing certificate name checks (e.g., TLS clients checking server certificates) may attempt to read an invalid memory address resulting in abnormal termination of the application process. Impact summary: Abnormal term...
CVE-2024-6387
- EPSS 38.58%
- Veröffentlicht 01.07.2024 13:15:06
- Zuletzt bearbeitet 30.09.2025 13:52:23
A security regression (CVE-2006-5051) was discovered in OpenSSH's server (sshd). There is a race condition which can lead sshd to handle some signals in an unsafe manner. An unauthenticated, remote attacker may be able to trigger it by failing to aut...
CVE-2024-1086
- EPSS 84.81%
- Veröffentlicht 31.01.2024 13:15:10
- Zuletzt bearbeitet 02.04.2025 20:32:33
A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation. The nft_verdict_init() function allows positive values as drop error within the hook verdict, and hence the n...
CVE-2023-25136
- EPSS 90.54%
- Veröffentlicht 03.02.2023 06:15:09
- Zuletzt bearbeitet 21.11.2024 07:49:10
OpenSSH server (sshd) 9.1 introduced a double-free vulnerability during options.kex_algorithms handling. This is fixed in OpenSSH 9.2. The double free can be leveraged, by an unauthenticated remote attacker in the default configuration, to jump to an...
CVE-2021-22555
- EPSS 84.63%
- Veröffentlicht 07.07.2021 12:15:08
- Zuletzt bearbeitet 07.10.2025 13:45:38
A heap out-of-bounds write affecting Linux since v2.6.19-rc1 was discovered in net/netfilter/x_tables.c. This allows an attacker to gain privileges or cause a DoS (via heap memory corruption) through user name space