fs/seq_file.c in the Linux kernel 3.16 through 5.13.x before 5.13.4 does not properly restrict seq buffer allocations, leading to an integer overflow, an Out-of-bounds Write, and escalation to root by an unprivileged user, aka...
7.8CVSS
7.8AI Score
0.002EPSS
A security issue in nginx resolver was identified, which might allow an attacker who is able to forge UDP packets from the DNS server to cause 1-byte memory overwrite, resulting in worker process crash or potential other...
7.7CVSS
7.6AI Score
0.52EPSS
Lodash versions prior to 4.17.21 are vulnerable to Command Injection via the template...
7.2CVSS
7.4AI Score
0.006EPSS
Lodash versions prior to 4.17.21 are vulnerable to Regular Expression Denial of Service (ReDoS) via the toNumber, trim and trimEnd...
5.3CVSS
6AI Score
0.002EPSS
7.4CVSS
7AI Score
0.01EPSS
9.8CVSS
9.2AI Score
0.012EPSS
9.8CVSS
9.7AI Score
0.098EPSS
stdlib/canonicalize.c in the GNU C Library (aka glibc or libc6) 2.27 and earlier, when processing very long pathname arguments to the realpath function, could encounter an integer overflow on 32-bit architectures, leading to a stack-based buffer overflow and, potentially, arbitrary code...
9.8CVSS
9.5AI Score
0.014EPSS
An AVX-512-optimized implementation of the mempcpy function in the GNU C Library (aka glibc or libc6) 2.27 and earlier may write data beyond the target buffer, leading to a buffer overflow in...
7.8CVSS
8.6AI Score
0.001EPSS
An integer overflow in the implementation of the posix_memalign in memalign functions in the GNU C Library (aka glibc or libc6) 2.26 and earlier could cause these functions to return a pointer to a heap area that is too small, potentially leading to heap...
9.8CVSS
8.5AI Score
0.005EPSS
Heap-based buffer overflow in the __nss_hostname_digits_dots function in glibc 2.2, and other 2.x versions before 2.18, allows context-dependent attackers to execute arbitrary code via vectors related to the (1) gethostbyname or (2) gethostbyname2 function, aka...