CVE-2023-34319
- EPSS 0.02%
- Published 22.09.2023 14:15:45
- Last modified 18.06.2025 15:15:22
The fix for XSA-423 added logic to Linux'es netback driver to deal with a frontend splitting a packet in a way such that not all of the headers would come in one piece. Unfortunately the logic introduced there didn't account for the extreme case of ...
CVE-2023-43770
- EPSS 75.03%
- Published 22.09.2023 06:15:10
- Last modified 20.12.2024 17:40:26
Roundcube before 1.4.14, 1.5.x before 1.5.4, and 1.6.x before 1.6.3 allows XSS via text/plain e-mail messages with crafted links because of program/lib/Roundcube/rcube_string_replacer.php behavior.
- EPSS 0.04%
- Published 21.09.2023 23:15:12
- Last modified 23.04.2025 17:16:44
Due to failure in validating the length provided by an attacker-crafted PPD PostScript document, CUPS and libppd are susceptible to a heap-based buffer overflow and possibly code execution. This issue has been fixed in CUPS version 2.4.7, released in...
CVE-2023-41993
- EPSS 12.7%
- Published 21.09.2023 19:15:11
- Last modified 29.11.2024 14:43:20
The issue was addressed with improved checks. This issue is fixed in macOS Sonoma 14. Processing web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited against versions of iOS bef...
CVE-2023-42464
- EPSS 7.7%
- Published 20.09.2023 15:15:11
- Last modified 21.11.2024 08:22:36
A Type Confusion vulnerability was found in the Spotlight RPC functions in afpd in Netatalk 3.1.x before 3.1.17. When parsing Spotlight RPC packets, one encoded data structure is a key-value style dictionary where the keys are character strings, and ...
CVE-2019-19450
- EPSS 6.4%
- Published 20.09.2023 14:15:12
- Last modified 21.11.2024 04:34:45
paraparser in ReportLab before 3.5.31 allows remote code execution because start_unichar in paraparser.py evaluates untrusted user input in a unichar element in a crafted XML document with '<unichar code="' followed by arbitrary Python code, a simila...
CVE-2023-4236
- EPSS 0.19%
- Published 20.09.2023 13:15:12
- Last modified 21.11.2024 08:34:41
A flaw in the networking code handling DNS-over-TLS queries may cause `named` to terminate unexpectedly due to an assertion failure. This happens when internal data structures are incorrectly reused under significant DNS-over-TLS query load. This iss...
CVE-2023-3341
- EPSS 0.29%
- Published 20.09.2023 13:15:11
- Last modified 21.11.2024 08:17:03
The code that processes control channel messages sent to `named` calls certain functions recursively during packet parsing. Recursion depth is only limited by the maximum accepted packet size; depending on the environment, this may cause the packet-p...
CVE-2023-41900
- EPSS 0.13%
- Published 15.09.2023 21:15:11
- Last modified 21.11.2024 08:21:53
Jetty is a Java based web server and servlet engine. Versions 9.4.21 through 9.4.51, 10.0.15, and 11.0.15 are vulnerable to weak authentication. If a Jetty `OpenIdAuthenticator` uses the optional nested `LoginService`, and that `LoginService` decides...
CVE-2023-40167
- EPSS 4.83%
- Published 15.09.2023 20:15:09
- Last modified 21.11.2024 08:18:54
Jetty is a Java based web server and servlet engine. Prior to versions 9.4.52, 10.0.16, 11.0.16, and 12.0.1, Jetty accepts the `+` character proceeding the content-length value in a HTTP/1 header field. This is more permissive than allowed by the RF...