CVE-2023-3216
- EPSS 0.87%
- Veröffentlicht 13.06.2023 18:15:22
- Zuletzt bearbeitet 05.05.2025 16:15:44
Type confusion in V8 in Google Chrome prior to 114.0.5735.133 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
CVE-2023-3217
- EPSS 16.59%
- Veröffentlicht 13.06.2023 18:15:22
- Zuletzt bearbeitet 05.05.2025 16:15:44
Use after free in WebXR in Google Chrome prior to 114.0.5735.133 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
CVE-2023-20867
- EPSS 2.72%
- Veröffentlicht 13.06.2023 17:15:14
- Zuletzt bearbeitet 28.10.2025 13:46:56
A fully compromised ESXi host can force VMware Tools to fail to authenticate host-to-guest operations, impacting the confidentiality and integrity of the guest virtual machine.
CVE-2023-3141
- EPSS 0.01%
- Veröffentlicht 09.06.2023 20:15:10
- Zuletzt bearbeitet 11.03.2025 15:15:38
A use-after-free flaw was found in r592_remove in drivers/memstick/host/r592.c in media access in the Linux Kernel. This flaw allows a local attacker to crash the system at device disconnect, possibly leading to a kernel information leak.
CVE-2023-34969
- EPSS 0.63%
- Veröffentlicht 08.06.2023 03:15:08
- Zuletzt bearbeitet 09.06.2025 15:15:29
D-Bus before 1.15.6 sometimes allows unprivileged users to crash dbus-daemon. If a privileged user with control over the dbus-daemon is using the org.freedesktop.DBus.Monitoring interface to monitor message bus traffic, then an unprivileged user with...
CVE-2023-0666
- EPSS 1.51%
- Veröffentlicht 07.06.2023 03:15:09
- Zuletzt bearbeitet 03.11.2025 22:16:03
Due to failure in validating the length provided by an attacker-crafted RTPS packet, Wireshark version 4.0.5 and prior, by default, is susceptible to a heap-based buffer overflow, and possibly code execution in the context of the process running Wire...
CVE-2023-0668
- EPSS 1.12%
- Veröffentlicht 07.06.2023 03:15:09
- Zuletzt bearbeitet 03.11.2025 22:16:03
Due to failure in validating the length provided by an attacker-crafted IEEE-C37.118 packet, Wireshark version 4.0.5 and prior, by default, is susceptible to a heap-based buffer overflow, and possibly code execution in the context of the process runn...
CVE-2023-2603
- EPSS 1.15%
- Veröffentlicht 06.06.2023 20:15:13
- Zuletzt bearbeitet 02.12.2025 21:15:51
A vulnerability was found in libcap. This issue occurs in the _libcap_strdup() function and can lead to an integer overflow if the input string is close to 4GiB.
CVE-2023-2602
- EPSS 0.02%
- Veröffentlicht 06.06.2023 20:15:12
- Zuletzt bearbeitet 21.11.2024 07:58:54
A vulnerability was found in the pthread_create() function in libcap. This issue may allow a malicious actor to use cause __real_pthread_create() to return an error, which can exhaust the process memory.
CVE-2023-33460
- EPSS 0.11%
- Veröffentlicht 06.06.2023 12:15:09
- Zuletzt bearbeitet 08.01.2025 17:15:12
There's a memory leak in yajl 2.1.0 with use of yajl_tree_parse function. which will cause out-of-memory in server and cause crash.