CVE-2023-38633
- EPSS 36.47%
- Veröffentlicht 22.07.2023 17:15:09
- Zuletzt bearbeitet 21.11.2024 08:13:58
A directory traversal problem in the URL decoder of librsvg before 2.56.3 could be used by local or remote attackers to disclose files (on the local filesystem outside of the expected area), as demonstrated by href=".?../../../../../../../../../../et...
CVE-2022-2127
- EPSS 1.25%
- Veröffentlicht 20.07.2023 15:15:11
- Zuletzt bearbeitet 21.11.2024 07:00:22
An out-of-bounds read vulnerability was found in Samba due to insufficient length checks in winbindd_pam_auth_crap.c. When performing NTLM authentication, the client replies to cryptographic challenges back to the server. These replies have variable ...
CVE-2023-34966
- EPSS 15.9%
- Veröffentlicht 20.07.2023 15:15:11
- Zuletzt bearbeitet 21.11.2024 08:07:44
An infinite loop vulnerability was found in Samba's mdssvc RPC service for Spotlight. When parsing Spotlight mdssvc RPC packets sent by the client, the core unmarshalling function sl_unpack_loop() did not validate a field in the network packet that c...
CVE-2023-34967
- EPSS 18.27%
- Veröffentlicht 20.07.2023 15:15:11
- Zuletzt bearbeitet 21.11.2024 08:07:44
A Type Confusion vulnerability was found in Samba's mdssvc RPC service for Spotlight. When parsing Spotlight mdssvc RPC packets, one encoded data structure is a key-value style dictionary where the keys are character strings, and the values can be an...
CVE-2023-34968
- EPSS 2.39%
- Veröffentlicht 20.07.2023 15:15:11
- Zuletzt bearbeitet 06.12.2024 11:15:05
A path disclosure vulnerability was found in Samba. As part of the Spotlight protocol, Samba discloses the server-side absolute path of shares, files, and directories in the results for search queries. This flaw allows a malicious client or an attack...
CVE-2023-3347
- EPSS 0.42%
- Veröffentlicht 20.07.2023 15:15:11
- Zuletzt bearbeitet 06.12.2024 11:15:06
A vulnerability was found in Samba's SMB2 packet signing mechanism. The SMB2 packet signing is not enforced if an admin configured "server signing = required" or for SMB2 connections to Domain Controllers where SMB2 packet signing is mandatory. This ...
CVE-2023-38408
- EPSS 64.65%
- Veröffentlicht 20.07.2023 03:15:10
- Zuletzt bearbeitet 21.11.2024 08:13:30
The PKCS#11 feature in ssh-agent in OpenSSH before 9.3p2 has an insufficiently trustworthy search path, leading to remote code execution if an agent is forwarded to an attacker-controlled system. (Code in /usr/lib is not necessarily safe for loading ...
CVE-2023-3674
- EPSS 0.02%
- Veröffentlicht 19.07.2023 19:15:12
- Zuletzt bearbeitet 21.11.2024 08:17:48
A flaw was found in the keylime attestation verifier, which fails to flag a device's submitted TPM quote as faulty when the quote's signature does not validate for some reason. Instead, it will only emit an error in the log without flagging the devic...
CVE-2023-22056
- EPSS 0.14%
- Veröffentlicht 18.07.2023 21:15:15
- Zuletzt bearbeitet 21.11.2024 07:44:11
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.33 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple pr...
CVE-2023-22057
- EPSS 0.05%
- Veröffentlicht 18.07.2023 21:15:15
- Zuletzt bearbeitet 21.11.2024 07:44:11
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Replication). Supported versions that are affected are 8.0.33 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple ...