CVE-2023-20052
- EPSS 8.86%
- Veröffentlicht 01.03.2023 08:15:11
- Zuletzt bearbeitet 21.11.2024 07:40:26
On Feb 15, 2023, the following vulnerability in the ClamAV scanning library was disclosed: A vulnerability in the DMG file parser of ClamAV versions 1.0.0 and earlier, 0.105.1 and earlier, and 0.103.7 and earlier could allow an unauthenticated, ...
CVE-2023-20032
- EPSS 6.06%
- Veröffentlicht 01.03.2023 08:15:11
- Zuletzt bearbeitet 21.11.2024 07:40:23
On Feb 15, 2023, the following vulnerability in the ClamAV scanning library was disclosed: A vulnerability in the HFS+ partition file parser of ClamAV versions 1.0.0 and earlier, 0.105.1 and earlier, and 0.103.7 and earlier could allow an unauth...
CVE-2023-0286
- EPSS 88.47%
- Veröffentlicht 08.02.2023 20:15:24
- Zuletzt bearbeitet 04.11.2025 20:16:16
There is a type confusion vulnerability relating to X.400 address processing inside an X.509 GeneralName. X.400 addresses were parsed as an ASN1_STRING but the public structure definition for GENERAL_NAME incorrectly specified the type of the x400Add...
CVE-2022-4450
- EPSS 0.14%
- Veröffentlicht 08.02.2023 20:15:23
- Zuletzt bearbeitet 04.11.2025 20:16:15
The function PEM_read_bio_ex() reads a PEM file from a BIO and parses and decodes the "name" (e.g. "CERTIFICATE"), any header data and the payload data. If the function succeeds then the "name_out", "header" and "data" arguments are populated with po...
CVE-2022-4304
- EPSS 0.26%
- Veröffentlicht 08.02.2023 20:15:23
- Zuletzt bearbeitet 04.11.2025 20:16:14
A timing based side channel exists in the OpenSSL RSA Decryption implementation which could be sufficient to recover a plaintext across a network in a Bleichenbacher style attack. To achieve a successful decryption an attacker would have to be able t...
CVE-2022-40617
- EPSS 0.26%
- Veröffentlicht 31.10.2022 06:15:09
- Zuletzt bearbeitet 06.05.2025 19:15:56
strongSwan before 5.9.8 allows remote attackers to cause a denial of service in the revocation plugin by sending a crafted end-entity (and intermediate CA) certificate that contains a CRL/OCSP URL that points to a server (under the attacker's control...
CVE-2022-27812
- EPSS 0.39%
- Veröffentlicht 24.08.2022 12:15:08
- Zuletzt bearbeitet 21.11.2024 06:56:14
Flooding SNS firewall versions 3.7.0 to 3.7.29, 3.11.0 to 3.11.17, 4.2.0 to 4.2.10, and 4.3.0 to 4.3.6 with specific forged traffic, can lead to SNS DoS.
CVE-2022-37434
- EPSS 92.47%
- Veröffentlicht 05.08.2022 07:15:07
- Zuletzt bearbeitet 30.05.2025 20:15:30
zlib through 1.2.12 has a heap-based buffer over-read or buffer overflow in inflate in inflate.c via a large gzip header extra field. NOTE: only applications that call inflateGetHeader are affected. Some common applications bundle the affected zlib s...
CVE-2022-30279
- EPSS 0.39%
- Veröffentlicht 12.05.2022 15:15:08
- Zuletzt bearbeitet 21.11.2024 07:02:29
An issue was discovered in Stormshield Network Security (SNS) 4.3.x before 4.3.8. The event logging of the ASQ sofbus lacbus plugin triggers the dereferencing of a NULL pointer, leading to a crash of SNS. An attacker could exploit this vulnerability ...
CVE-2022-23989
- EPSS 0.39%
- Veröffentlicht 15.03.2022 21:15:09
- Zuletzt bearbeitet 21.11.2024 06:49:36
In Stormshield Network Security (SNS) before 3.7.25, 3.8.x through 3.11.x before 3.11.13, 4.x before 4.2.10, and 4.3.x before 4.3.5, a flood of connections to the SSLVPN service might lead to saturation of the loopback interface. This could result in...