CVE-2024-22201
- EPSS 0.45%
- Veröffentlicht 26.02.2024 16:27:56
- Zuletzt bearbeitet 13.02.2025 18:16:46
Jetty is a Java based web server and servlet engine. An HTTP/2 SSL connection that is established and TCP congested will be leaked when it times out. An attacker can cause many connections to end up in this state, and the server may run out of file d...
CVE-2024-26598
- EPSS 0.01%
- Veröffentlicht 23.02.2024 15:15:09
- Zuletzt bearbeitet 21.11.2024 09:02:37
In the Linux kernel, the following vulnerability has been resolved: KVM: arm64: vgic-its: Avoid potential UAF in LPI translation cache There is a potential UAF scenario in the case of an LPI translation cache hit racing with an operation that inval...
CVE-2023-52160
- EPSS 3.12%
- Veröffentlicht 22.02.2024 17:15:08
- Zuletzt bearbeitet 04.11.2025 19:16:22
The implementation of PEAP in wpa_supplicant through 2.10 allows authentication bypass. For a successful attack, wpa_supplicant must be configured to not verify the network's TLS certificate during Phase 1 authentication, and an eap_peap_decrypt vuln...
- EPSS 0.02%
- Veröffentlicht 20.02.2024 18:15:50
- Zuletzt bearbeitet 17.01.2025 20:15:27
In the Linux kernel, the following vulnerability has been resolved: smb: client: fix potential OOBs in smb2_parse_contexts() Validate offsets and lengths before dereferencing create contexts in smb2_parse_contexts(). This fixes following oops when...
CVE-2024-1546
- EPSS 0.37%
- Veröffentlicht 20.02.2024 14:15:08
- Zuletzt bearbeitet 27.03.2025 14:35:06
When storing and re-accessing data on a networking channel, the length of buffers may have been confused, resulting in an out-of-bounds memory read. This vulnerability affects Firefox < 123, Firefox ESR < 115.8, and Thunderbird < 115.8.
CVE-2024-1547
- EPSS 0.45%
- Veröffentlicht 20.02.2024 14:15:08
- Zuletzt bearbeitet 28.03.2025 18:15:16
Through a series of API calls and redirects, an attacker-controlled alert dialog could have been displayed on another website (with the victim website's URL shown). This vulnerability affects Firefox < 123, Firefox ESR < 115.8, and Thunderbird < 115....
CVE-2024-1548
- EPSS 0.33%
- Veröffentlicht 20.02.2024 14:15:08
- Zuletzt bearbeitet 27.03.2025 14:36:57
A website could have obscured the fullscreen notification by using a dropdown select input element. This could have led to user confusion and possible spoofing attacks. This vulnerability affects Firefox < 123, Firefox ESR < 115.8, and Thunderbird < ...
CVE-2024-1549
- EPSS 0.34%
- Veröffentlicht 20.02.2024 14:15:08
- Zuletzt bearbeitet 27.03.2025 14:37:40
If a website set a large custom cursor, portions of the cursor could have overlapped with the permission dialog, potentially resulting in user confusion and unexpected granted permissions. This vulnerability affects Firefox < 123, Firefox ESR < 115.8...
CVE-2024-1550
- EPSS 0.2%
- Veröffentlicht 20.02.2024 14:15:08
- Zuletzt bearbeitet 27.03.2025 20:15:21
A malicious website could have used a combination of exiting fullscreen mode and `requestPointerLock` to cause the user's mouse to be re-positioned unexpectedly, which could have led to user confusion and inadvertently granting permissions they did n...
CVE-2024-1551
- EPSS 0.29%
- Veröffentlicht 20.02.2024 14:15:08
- Zuletzt bearbeitet 02.04.2025 20:12:09
Set-Cookie response headers were being incorrectly honored in multipart HTTP responses. If an attacker could control the Content-Type response header, as well as control part of the response body, they could inject Set-Cookie response headers that wo...