CVE-2023-3214
- EPSS 1.85%
- Veröffentlicht 13.06.2023 18:15:22
- Zuletzt bearbeitet 05.05.2025 16:15:44
Use after free in Autofill payments in Google Chrome prior to 114.0.5735.133 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Critical)
CVE-2023-3215
- EPSS 20.98%
- Veröffentlicht 13.06.2023 18:15:22
- Zuletzt bearbeitet 05.05.2025 16:15:44
Use after free in WebRTC in Google Chrome prior to 114.0.5735.133 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
CVE-2023-3216
- EPSS 0.92%
- Veröffentlicht 13.06.2023 18:15:22
- Zuletzt bearbeitet 05.05.2025 16:15:44
Type confusion in V8 in Google Chrome prior to 114.0.5735.133 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
CVE-2023-3217
- EPSS 17.46%
- Veröffentlicht 13.06.2023 18:15:22
- Zuletzt bearbeitet 05.05.2025 16:15:44
Use after free in WebXR in Google Chrome prior to 114.0.5735.133 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
CVE-2023-20867
- EPSS 2.95%
- Veröffentlicht 13.06.2023 17:15:14
- Zuletzt bearbeitet 28.10.2025 13:46:56
A fully compromised ESXi host can force VMware Tools to fail to authenticate host-to-guest operations, impacting the confidentiality and integrity of the guest virtual machine.
CVE-2023-3141
- EPSS 0.01%
- Veröffentlicht 09.06.2023 20:15:10
- Zuletzt bearbeitet 11.03.2025 15:15:38
A use-after-free flaw was found in r592_remove in drivers/memstick/host/r592.c in media access in the Linux Kernel. This flaw allows a local attacker to crash the system at device disconnect, possibly leading to a kernel information leak.
CVE-2023-34969
- EPSS 0.94%
- Veröffentlicht 08.06.2023 03:15:08
- Zuletzt bearbeitet 09.06.2025 15:15:29
D-Bus before 1.15.6 sometimes allows unprivileged users to crash dbus-daemon. If a privileged user with control over the dbus-daemon is using the org.freedesktop.DBus.Monitoring interface to monitor message bus traffic, then an unprivileged user with...
CVE-2023-0666
- EPSS 2.49%
- Veröffentlicht 07.06.2023 03:15:09
- Zuletzt bearbeitet 03.11.2025 22:16:03
Due to failure in validating the length provided by an attacker-crafted RTPS packet, Wireshark version 4.0.5 and prior, by default, is susceptible to a heap-based buffer overflow, and possibly code execution in the context of the process running Wire...
CVE-2023-0668
- EPSS 1.85%
- Veröffentlicht 07.06.2023 03:15:09
- Zuletzt bearbeitet 03.11.2025 22:16:03
Due to failure in validating the length provided by an attacker-crafted IEEE-C37.118 packet, Wireshark version 4.0.5 and prior, by default, is susceptible to a heap-based buffer overflow, and possibly code execution in the context of the process runn...
CVE-2023-2603
- EPSS 1.12%
- Veröffentlicht 06.06.2023 20:15:13
- Zuletzt bearbeitet 02.12.2025 21:15:51
A vulnerability was found in libcap. This issue occurs in the _libcap_strdup() function and can lead to an integer overflow if the input string is close to 4GiB.