CVE-2023-3772
- EPSS 0.01%
- Veröffentlicht 25.07.2023 16:15:11
- Zuletzt bearbeitet 21.11.2024 08:18:01
A flaw was found in the Linux kernel’s IP framework for transforming packets (XFRM subsystem). This issue may allow a malicious user with CAP_NET_ADMIN privileges to directly dereference a NULL pointer in xfrm_update_ae_params(), leading to a possibl...
CVE-2023-3773
- EPSS 0.01%
- Veröffentlicht 25.07.2023 16:15:11
- Zuletzt bearbeitet 21.11.2024 08:18:01
A flaw was found in the Linux kernel’s IP framework for transforming packets (XFRM subsystem). This issue may allow a malicious user with CAP_NET_ADMIN privileges to cause a 4 byte out-of-bounds read of XFRMA_MTIMER_THRESH when parsing netlink attrib...
CVE-2023-38200
- EPSS 0.21%
- Veröffentlicht 24.07.2023 16:15:12
- Zuletzt bearbeitet 21.11.2024 08:13:04
A flaw was found in Keylime. Due to their blocking nature, the Keylime registrar is subject to a remote denial of service against its SSL connections. This flaw allows an attacker to exhaust all available connections.
CVE-2023-1386
- EPSS 0.02%
- Veröffentlicht 24.07.2023 16:15:11
- Zuletzt bearbeitet 21.11.2024 07:39:05
A flaw was found in the 9p passthrough filesystem (9pfs) implementation in QEMU. When a local user in the guest writes an executable file with SUID or SGID, none of these privileged bits are correctly dropped. As a result, in rare circumstances, this...
CVE-2023-38633
- EPSS 36.47%
- Veröffentlicht 22.07.2023 17:15:09
- Zuletzt bearbeitet 21.11.2024 08:13:58
A directory traversal problem in the URL decoder of librsvg before 2.56.3 could be used by local or remote attackers to disclose files (on the local filesystem outside of the expected area), as demonstrated by href=".?../../../../../../../../../../et...
CVE-2022-2127
- EPSS 1.25%
- Veröffentlicht 20.07.2023 15:15:11
- Zuletzt bearbeitet 21.11.2024 07:00:22
An out-of-bounds read vulnerability was found in Samba due to insufficient length checks in winbindd_pam_auth_crap.c. When performing NTLM authentication, the client replies to cryptographic challenges back to the server. These replies have variable ...
CVE-2023-34966
- EPSS 15.9%
- Veröffentlicht 20.07.2023 15:15:11
- Zuletzt bearbeitet 21.11.2024 08:07:44
An infinite loop vulnerability was found in Samba's mdssvc RPC service for Spotlight. When parsing Spotlight mdssvc RPC packets sent by the client, the core unmarshalling function sl_unpack_loop() did not validate a field in the network packet that c...
CVE-2023-34967
- EPSS 18.27%
- Veröffentlicht 20.07.2023 15:15:11
- Zuletzt bearbeitet 21.11.2024 08:07:44
A Type Confusion vulnerability was found in Samba's mdssvc RPC service for Spotlight. When parsing Spotlight mdssvc RPC packets, one encoded data structure is a key-value style dictionary where the keys are character strings, and the values can be an...
CVE-2023-34968
- EPSS 2.2%
- Veröffentlicht 20.07.2023 15:15:11
- Zuletzt bearbeitet 06.12.2024 11:15:05
A path disclosure vulnerability was found in Samba. As part of the Spotlight protocol, Samba discloses the server-side absolute path of shares, files, and directories in the results for search queries. This flaw allows a malicious client or an attack...
CVE-2023-3347
- EPSS 0.42%
- Veröffentlicht 20.07.2023 15:15:11
- Zuletzt bearbeitet 06.12.2024 11:15:06
A vulnerability was found in Samba's SMB2 packet signing mechanism. The SMB2 packet signing is not enforced if an admin configured "server signing = required" or for SMB2 connections to Domain Controllers where SMB2 packet signing is mandatory. This ...