CVE-2023-41993
- EPSS 21.71%
- Veröffentlicht 21.09.2023 19:15:11
- Zuletzt bearbeitet 05.11.2025 19:17:52
The issue was addressed with improved checks. This issue is fixed in macOS Sonoma 14. Processing web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited against versions of iOS bef...
CVE-2023-43669
- EPSS 3.22%
- Veröffentlicht 21.09.2023 06:15:13
- Zuletzt bearbeitet 21.11.2024 08:24:35
The Tungstenite crate before 0.20.1 for Rust allows remote attackers to cause a denial of service (minutes of CPU consumption) via an excessive length of an HTTP header in a client handshake. The length affects both how many times a parse is attempte...
CVE-2023-4236
- EPSS 0.18%
- Veröffentlicht 20.09.2023 13:15:12
- Zuletzt bearbeitet 21.11.2024 08:34:41
A flaw in the networking code handling DNS-over-TLS queries may cause `named` to terminate unexpectedly due to an assertion failure. This happens when internal data structures are incorrectly reused under significant DNS-over-TLS query load. This iss...
CVE-2023-3341
- EPSS 0.19%
- Veröffentlicht 20.09.2023 13:15:11
- Zuletzt bearbeitet 02.12.2025 21:15:51
The code that processes control channel messages sent to `named` calls certain functions recursively during packet parsing. Recursion depth is only limited by the maximum accepted packet size; depending on the environment, this may cause the packet-p...
CVE-2023-4527
- EPSS 0.11%
- Veröffentlicht 18.09.2023 17:15:55
- Zuletzt bearbeitet 24.06.2025 17:31:20
A flaw was found in glibc. When the getaddrinfo function is called with the AF_UNSPEC address family and the system is configured with no-aaaa mode via /etc/resolv.conf, a DNS response via TCP larger than 2048 bytes can potentially disclose stack con...
CVE-2023-4806
- EPSS 1.9%
- Veröffentlicht 18.09.2023 17:15:55
- Zuletzt bearbeitet 26.09.2025 12:15:32
A flaw has been identified in glibc. In an extremely rare situation, the getaddrinfo function may access memory that has been freed, resulting in an application crash. This issue is only exploitable when a NSS module implements only the _nss_*_gethos...
CVE-2023-43115
- EPSS 20.06%
- Veröffentlicht 18.09.2023 08:15:07
- Zuletzt bearbeitet 21.11.2024 08:23:43
In Artifex Ghostscript through 10.01.2, gdevijs.c in GhostPDL can lead to remote code execution via crafted PostScript documents because they can switch to the IJS device, or change the IjsServer parameter, after SAFER has been activated. NOTE: it is...
CVE-2023-38039
- EPSS 14.47%
- Veröffentlicht 15.09.2023 04:15:10
- Zuletzt bearbeitet 02.12.2025 20:15:46
When curl retrieves an HTTP response, it stores the incoming headers so that they can be accessed later via the libcurl headers API. However, curl did not have a limit in how many or how large headers it would accept in a response, allowing a malici...
CVE-2023-4155
- EPSS 0.01%
- Veröffentlicht 13.09.2023 17:15:10
- Zuletzt bearbeitet 21.11.2024 08:34:30
A flaw was found in KVM AMD Secure Encrypted Virtualization (SEV) in the Linux kernel. A KVM guest using SEV-ES or SEV-SNP with multiple vCPUs can trigger a double fetch race condition vulnerability and invoke the `VMGEXIT` handler recursively. If an...
CVE-2023-3255
- EPSS 0.13%
- Veröffentlicht 13.09.2023 17:15:09
- Zuletzt bearbeitet 21.11.2024 08:16:48
A flaw was found in the QEMU built-in VNC server while processing ClientCutText messages. A wrong exit condition may lead to an infinite loop when inflating an attacker controlled zlib buffer in the `inflate_buffer` function. This could allow a remot...