CVE-2022-48065
- EPSS 0.02%
- Veröffentlicht 22.08.2023 19:16:31
- Zuletzt bearbeitet 21.11.2024 07:32:46
GNU Binutils before 2.40 was discovered to contain a memory leak vulnerability var the function find_abstract_instance in dwarf2.c.
CVE-2022-48064
- EPSS 0.01%
- Veröffentlicht 22.08.2023 19:16:30
- Zuletzt bearbeitet 21.11.2024 07:32:46
GNU Binutils before 2.40 was discovered to contain an excessive memory consumption vulnerability via the function bfd_dwarf2_find_nearest_line_with_alt at dwarf2.c. The attacker could supply a crafted ELF file and cause a DNS attack.
CVE-2023-37920
- EPSS 0.11%
- Veröffentlicht 25.07.2023 21:15:10
- Zuletzt bearbeitet 13.02.2025 13:50:15
Certifi is a curated collection of Root Certificates for validating the trustworthiness of SSL certificates while verifying the identity of TLS hosts. Certifi prior to version 2023.07.22 recognizes "e-Tugra" root certificates. e-Tugra's root certific...
CVE-2023-38403
- EPSS 1.12%
- Veröffentlicht 17.07.2023 21:15:09
- Zuletzt bearbeitet 21.11.2024 08:13:29
iperf3 before 3.14 allows peers to cause an integer overflow and heap corruption via a crafted length field.
CVE-2023-2975
- EPSS 0.19%
- Veröffentlicht 14.07.2023 12:15:09
- Zuletzt bearbeitet 23.04.2025 17:16:32
Issue summary: The AES-SIV cipher implementation contains a bug that causes it to ignore empty associated data entries which are unauthenticated as a consequence. Impact summary: Applications that use the AES-SIV algorithm and want to authenticate e...
CVE-2023-27043
- EPSS 0.1%
- Veröffentlicht 19.04.2023 00:15:07
- Zuletzt bearbeitet 03.11.2025 22:16:06
The email module of Python through 3.11.3 incorrectly parses e-mail addresses that contain a special character. The wrong portion of an RFC2822 header is identified as the value of the addr-spec. In some applications, an attacker can bypass a protect...
CVE-2023-24329
- EPSS 1.22%
- Veröffentlicht 17.02.2023 15:15:12
- Zuletzt bearbeitet 03.11.2025 22:16:05
An issue in the urllib.parse component of Python before 3.11.4 allows attackers to bypass blocklisting methods by supplying a URL that starts with blank characters.
CVE-2023-0361
- EPSS 1.56%
- Veröffentlicht 15.02.2023 18:15:11
- Zuletzt bearbeitet 19.03.2025 18:15:18
A timing side-channel in the handling of RSA ClientKeyExchange messages was discovered in GnuTLS. This side-channel can be sufficient to recover the key encrypted in the RSA ciphertext across a network in a Bleichenbacher style attack. To achieve a s...
CVE-2023-25136
- EPSS 90.67%
- Veröffentlicht 03.02.2023 06:15:09
- Zuletzt bearbeitet 21.11.2024 07:49:10
OpenSSH server (sshd) 9.1 introduced a double-free vulnerability during options.kex_algorithms handling. This is fixed in OpenSSH 9.2. The double free can be leveraged, by an unauthenticated remote attacker in the default configuration, to jump to an...
CVE-2022-4292
- EPSS 0.38%
- Veröffentlicht 05.12.2022 19:15:10
- Zuletzt bearbeitet 21.11.2024 07:34:57
Use After Free in GitHub repository vim/vim prior to 9.0.0882.