CVE-2024-6119
- EPSS 4.4%
- Published 03.09.2024 16:15:07
- Last modified 03.06.2025 10:51:54
Issue summary: Applications performing certificate name checks (e.g., TLS clients checking server certificates) may attempt to read an invalid memory address resulting in abnormal termination of the application process. Impact summary: Abnormal term...
CVE-2024-6387
- EPSS 38.58%
- Published 01.07.2024 13:15:06
- Last modified 30.09.2025 13:52:23
A security regression (CVE-2006-5051) was discovered in OpenSSH's server (sshd). There is a race condition which can lead sshd to handle some signals in an unsafe manner. An unauthenticated, remote attacker may be able to trigger it by failing to aut...
CVE-2024-1086
- EPSS 84.81%
- Published 31.01.2024 13:15:10
- Last modified 02.04.2025 20:32:33
A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation. The nft_verdict_init() function allows positive values as drop error within the hook verdict, and hence the n...
CVE-2023-25136
- EPSS 90.54%
- Published 03.02.2023 06:15:09
- Last modified 21.11.2024 07:49:10
OpenSSH server (sshd) 9.1 introduced a double-free vulnerability during options.kex_algorithms handling. This is fixed in OpenSSH 9.2. The double free can be leveraged, by an unauthenticated remote attacker in the default configuration, to jump to an...